911 resultados para DROP ATTACKS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a possibility for quantitative measuring of information security of objects, exposed to information attacks and processed with methods of compression, is represented. A co-efficient of information security, which reflects the influence of the level of compression obtained after applying methods of compression to objects and the time, required by the attack to get access to the corresponding object, is proposed. Methods’ groups with the highest and respectively the lowest values of the co-efficient of information security for all methods’ groups in relation to all attacks’ groups are determined. Assessments and conclusions for future investigations are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present the experimental implementation of an all-optical ROADM scheme for routing of an individual subchannel within an all-optical OFDM superchannel. The different functions required of optical node were demonstrated using interferometric technique with the extraction, drop, and addition of individual subchannel in a ten subchannels optically aggregated signal. The scheme we reported enables a fully flexible node compatible with future terabit per second superchannel transmission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a methodology for evaluation of information security of objects under attacks, processed by methods of compression, is represented. Two basic parameters for evaluation of information security of objects – TIME and SIZE – are chosen and the characteristics, which reflect on their evaluation, are analyzed and estimated. A co-efficient of information security of object is proposed as a mean of the coefficients of the parameter TIME and SIZE. From the simulation experiments which were carried out methods with the highest co-efficient of information security had been determined. Assessments and conclusions for future investigations are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report examines important issues pertaining to the different ways of affecting the information security of file objects under information attacks through methods of compression. Accordingly, the report analyzes the three-way relationships which may exist among a selected set of attacks, methods and objects. Thus, a methodology is proposed for evaluation of information security, and a coefficient of information security is created. With respects to this coefficient, using different criteria and methods for evaluation and selection of alternatives, the lowest-risk methods of compression are selected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a method for detecting and analyzing the so-called replay attacks in intrusion detection systems, when an intruder contributes a small amount of hostile actions to a recorded session of a legitimate user or process, and replays this session back to the system. The proposed approach can be applied if an automata-based model is used to describe behavior of active entities in a computer system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The initial aim of this project was to develop a non-contact fibre optic based displacement sensor to operate in the harsh environment of a 'Light Gas Gun' (LGG), which can 'fire' small particles at velocities ranging from 1-8.4 km/s. The LGG is used extensively for research in aerospace to analyze the effects of high speed impacts on materials. Ideally the measurement should be made close to the centre of the impact to minimise corruption of the data from edge effects and survive the impact. A further requirement is that it should operate at a stand-off distance of ~ 8cm. For these reasons we chose to develop a pseudo con-focal intensity sensor, which demonstrated resolution comparable with conventional PVDF sensors combined with high survivability and low cost. A second sensor was developed based on 'Fibre Bragg Gratings' (FBG) which although requiring contact with the target the low weight and very small contact area had minimal effect on the dynamics of the target. The FBG was mounted either on the surface of the target or tangentially between a fixed location. The output signals from the FBG were interrogated in time by a new method. Measurements were made on composite and aluminium plates in the LGG and on low speed drop tests. The particle momentum for the drop tests was chosen to be similar to that of the particles used in the LGG.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer networks are a critical factor for the performance of a modern company. Managing networks is as important as managing any other aspect of the company’s performance and security. There are many tools and appliances for monitoring the traffic and analyzing the network flow security. They use different approaches and rely on a variety of characteristics of the network flows. Network researchers are still working on a common approach for security baselining that might enable early watch alerts. This research focuses on the network security models, particularly the Denial-of-Services (DoS) attacks mitigation, based on a network flow analysis using the flows measurements and the theory of Markov models. The content of the paper comprises the essentials of the author’s doctoral thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We discuss the recently proposed architecture for an all-optical add-drop multiplexer of OFDM signals and we summarize the results of its theoretical design and experimental implementation. © 2015 OSA.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We summarize our research work on the design and development of an add-drop multiplexer for spectrally overlapping OFDM signals. The standard node functions of sub-channel drop, extraction and insertion were obtained whilst the signals remained fully in the optical domain. Numerical simulations have been carried out to identify the main sources of degradation and to benchmark the architectural performance against critical design parameters, whereas the experimental demonstration of the scheme has been achieved for both single quadrature and dual quadrature signals. The reported scheme enables a fully flexible node compatible with future terabit per second super-channel transmission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a novel architecture for all-optical add-drop multiplexing of OFDM signals. Sub-channel extraction is achieved by means of waveform replication and coherent subtraction from the OFDM super-channel. Numerical simulations have been carried out to benchmark the performance of the architecture against critical design parameters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The experimental implementation of an all-optical node able of routing a channel contained in an all-optical OFDM super-channel is presented. The extract function is performed through channel selection, reshaping and interferometric suppression.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION: We investigated whether interictal thalamic dysfunction in migraine without aura (MO) patients is a primary determinant or the expression of its functional disconnection from proximal or distal areas along the somatosensory pathway. METHODS: Twenty MO patients and twenty healthy volunteers (HVs) underwent an electroencephalographic (EEG) recording during electrical stimulation of the median nerve at the wrist. We used the functional source separation algorithm to extract four functionally constrained nodes (brainstem, thalamus, primary sensory radial, and primary sensory motor tangential parietal sources) along the somatosensory pathway. Two digital filters (1-400 Hz and 450-750 Hz) were applied in order to extract low- (LFO) and high- frequency (HFO) oscillatory activity from the broadband signal. RESULTS: Compared to HVs, patients presented significantly lower brainstem (BS) and thalamic (Th) HFO activation bilaterally. No difference between the two cortical HFO as well as in LFO peak activations between the two groups was seen. The age of onset of the headache was positively correlated with HFO power in the right brainstem and thalamus. CONCLUSIONS: This study provides evidence for complex dysfunction of brainstem and thalamocortical networks under the control of genetic factors that might act by modulating the severity of migraine phenotype.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Like many West Indians, mixed-race Jamaican immigrants enter the United States with fluid notions about race and racial identifications that reflect socio-political events in their home country and that conflict with the more rigid constructions of race they encounter in the U.S. This dissertation explores the experiences of racially mixed Jamaicans in South Florida and the impact of those experiences on their racial self-characterizations through the boundary-work theoretical framework. Specifically, the study examines the impact of participants’ exposure to the one-drop rule in the U.S., by which racial identification has been historically determined by the existence or non-existence of black forebears. Employing qualitative data collected through both focus group and face-to-face semi-structured interviews, the study analyzes mixed-race Jamaicans’ encounters in the U.S. with racial boundaries, and the boundary-work that reinforces them, as well their response to these encounters. Through their stories, the dissertation examines participants’ efforts to navigate racial boundaries through choices of various racial identifications. Further, it discusses the ways in which structural forces and individual agency have interacted in the formation of these identifications. The study finds that in spite of participants’ expressed preference for non-racialism, and despite their objections to rigid racial categories, in seeking to carve out alternative identities, they are participating in the boundary-making of which they are so critical.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory, the assumption of a rational node is relaxed, leading to the development of a framework for mitigating routing selfishness and misbehavior in Multi hop networks. This is accomplished by setting nodes to play a fixed strategy rather than independently choosing a rational strategy. A range of simulations was carried out that showed improved cooperation between selfish nodes when compared to older results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from malicious attacks. Therefore, using game theory and evolutionary game theory, a mathematical framework has been developed that explores trust mechanisms to achieve security in the network. This framework is one of the first steps towards the synthesis of an integrated solution that demonstrates that security solely depends on the initial trust level that nodes have for each other.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer reviewed