916 resultados para Tidal Intrusion


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to an intrusion detection problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we collate the algorithms used, the development of the systems and the outcome of their implementation. It provides an introduction and review of the key developments within this field, in addition to making suggestions for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an extent that the resources required to successfully mount the attack become prohibitive. The key idea presented is to combine a token bucket filter with a realtime correlation algorithm. The proposed algorithm throttles alert output from the IDS when an attack is detected. The attack graph used in the correlation algorithm is used to make sure that alerts crucial to forming strategies are not discarded by throttling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of computer systems in the form of firewalls, antivirus software and intrusion detection systems. The complexity of networks and dynamic nature of computer systems leaves current methods with significant room for improvement. Computer scientists have recently drawn inspiration from mechanisms found in biological systems and, in the context of computer security, have focused on the human immune system (HIS). The human immune system provides an example of a robust, distributed system that provides a high level of protection from constant attacks. By examining the precise mechanisms of the human immune system, it is hoped the paradigm will improve the performance of real intrusion detection systems. This paper presents an introduction to recent developments in the field of immunology. It discusses the incorporation of a novel immunological paradigm, Danger Theory, and how this concept is inspiring artificial immune systems (AIS). Applications within the context of computer security are outlined drawing direct reference to the underlying principles of Danger Theory and finally, the current state of intrusion detection systems is discussed and improvements suggested.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This project was done for identifying and survey on distribution and diversity of true crabs in inter tidal and sub tidal zones of the Gulf of Oman (Sistan and Baluchistan province) during two year from 2009 to 2010. Specimens of inter tidal zones were carried out at 10 stations and 8 stations from sub tidal. The specimens were collected by hand and dip-net from inter tidal and by trawl net from sub tidal regions, preserved in 70% alcohol and carried to the laboratory. A total of 37 species belonged to 17 families from inter tidal and 23 species belonged to 9 families from sub tidal were identified. Of which 54 species were identified up to species level. 2 species from Matutidae, 1 species from Eriphiidae, Menippidae, Pseudoziidae, Plagusidae, Varunidae, Camptandriidae, Dromiidae and Dorippidae, 2 species from Oziidae, 3 species from Epialtidae, 2 species from Majidae, 4 species from Pilumnidae, 12 species from Portunidae, 6 species from Xanthidae, 2 species from Grapsidae, 3 species from Dotillidae, 3 species from Macrophthalmidae, 3 species from Ocypodidae, 3 species from Calappidae, 2 species from Parthenopidae and 1 species from Galenidae were identified. All specimens are deposited in the Zoological Museum, University of Tehran (ZUTC). The results of the present study revealed that family Portunidae with 6 species from inter tidal and 9 species from sub tidal regions have the highest species richness among the 22 families. Maximum similarity (Sorenson's Index) was obtained among the stations Breis, Lipar, Pozm and Gordim, and minimum was obtained among the stations Chazire-Kharchang with Pasabandar, Beris, Lipar, Daria-Bozorg, Pozm and Gordim in intertidal regions. In sub tidal regions maximum similarity (Sorenson's Index) was obtained among the stations Pasa bandar with Berisand minimum was obtained among the stations Govatr with Ramin and Gordim, Ramin with Pozm. Also maximum species richness was observed at Tiss in inter tidal and Chabahar in sub tidal stations, whereas minimum was obtained at Beris, Pozm, Gordim and Lipar in inter tidal and Govatr and Pozm in sub tidal stations. Family Ocypodidae in inter tidal and Portunidae in sub tidal regions have the highest distribution. In all of the species length and Breadth of carapace showed significant relation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and Snort is one popular and actively developing open-source IDS that uses such a set of signatures known as Snort rules. Our aim is to identify a way in which Snort could be developed further by generalising rules to identify novel attacks. In particular, we attempted to relax and vary the conditions and parameters of current Snort rules, using a similar approach to classic rule learning operators such as generalisation and specialisation. We demonstrate the effectiveness of our approach through experiments with standard datasets and show that we are able to detect previously undetected variants of various attacks. We conclude by discussing the general effectiveness and appropriateness of generalisation in Snort based IDS rule processing. Keywords: anomaly detection, intrusion detection, Snort, Snort rules

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this research is to study sedimentation mechanism by mathematical modeling in access channels which are affected by tidal currents. The most important factor for recognizing sedimentation process in every water environment is the flow pattern of that environment. It is noteworthy that the flow pattern is affected by the geometry and the shape of the environment as well as the type of existing affects in area. The area under the study in this thesis is located in Bushehr Gulf and the access channels (inner and outer). The study utilizes the hydrodynamic modeling with unstructured triangular and non-overlapping grids, using the finite volume, From method analysis in two scale sizes: large scale (200 m to 7.5km) and small scale (50m to 7.5km) in two different time durations of 15 days and 3.5 days to obtain the flow patterns. The 2D governing equations used in the model are the Depth-Averaged Shallow Water Equations. Turbulence Modeling is required to calculate the Eddy Viscosity Coefficient using the Smagorinsky Model with coefficient of 0.3. In addition to the flow modeling in two different scales and the use of the data of 3.5 day tidal current modeling have been considered to study the effects of the sediments equilibrium in the area and the channels. This model is capable of covering the area which is being settled and eroded and to identify the effects of tidal current of these processes. The required data of the above mentioned models such as current and sediments data have been obtained by the measurements in Bushehr Gulf and the access channels which was one of the PSO's (Port and Shipping Organization) project-titled, "The Sedimentation Modeling in Bushehr Port" in 1379. Hydrographic data have been obtained from Admiralty maps (2003) and Cartography Organization (1378, 1379). The results of the modeling includes: cross shore currents in northern and north western coasts of Bushehr Gulf during the neap tide and also the same current in northern and north eastern coasts of the Gulf during the spring tide. These currents wash and carry fine particles (silt, clay, and mud) from the coastal bed of which are generally made of mud and clay with some silts. In this regard, the role of sediments in the islands of this area and the islands made of depot of dredged sediments should not be ignored. The result of using 3.5 day modeling is that the cross channels currents leads to settlement places in inner and outer channels in tidal period. In neap tide the current enters the channel from upside bend of the two channels and outer channel. Then it crosses the channel oblique in some places of the outer channel. Also the oblique currents or even almost perpendicular current from up slope of inner channel between No. 15 and No. 18 buoys interact between the parallel currents in the channel and made secondary oblique currents which exit as a down-slope current in the channel and causes deposit of sediments as well as settling the suspended sediments carried by these currents. In addition in outer channel the speed of parallel currents in the bend of the channel which is naturally deeper increases. Therefore, it leads to erosion and suspension of sediments in this area. The speed of suspended sediments carried by this current which is parallel to the channel axis decreases when they pass through the shallower part of the channel where it is in the buoys No.7 and 8 to 5 and 6 are located. Therefore, the suspended sediment settles and because of this process these places will be even shallower. Furthermore, the passing of oblique upstream leads to settlement of the sediments in the up-slope and has an additional effect on the process of decreasing the depth of these locations. On the contrary, in the down-slope channel, as the results of sediments and current modeling indicates the speed of current increases and the currents make the particles of down-slope channel suspended and be carried away. Thus, in a vast area of downstream of both channels, the sediments have settled. At the end of the neap tide, the process along with circulations in this area produces eddies which causes sedimentation in the area. During spring some parts of this active location for sedimentation will enter both channels in a reverse process. The above mentioned processes and the places of sedimentation and erosion in inner and outer channels are validated by the sediments equilibrium modeling. This model will be able to estimate the suspended, bed load and the boundary layer thickness in each point of both channels and in the modeled area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis, producing ability of electricity by horizontal tidal current turbines and installing possibility of these turbines on bridge's piers in the marine environments has been studied to reduce primary implementation costs and make the plan, economical. To do this and to study its feasibility, the exerted forces from installing horizontal tidal current turbines were compared with the forces applied to the bridge structure during designing process (given in the Standards). Then, the allowable ranges of the overloading which is tolerable by the piers of the bridge were obtained. Accordingly, it is resulted that for installing these turbines, the piers of the existing bridges are required to be strengthened. Because of increasing usage of renewable powers and as a suggestion, the exerted forces from installing turbine for loading coefficients of different Standards are given. Finally as an example, preliminary designing of a horizontal tidal current turbine was carried out for Gesham Channel and the forces exerted from turbine to the bridge's pier were calculated for the future usage in order to create a test site of real dimensions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the secular dynamics of three-body circumbinary systems under the effect of tides. We use the octupolar non-restricted approximation for the orbital interactions, general relativity corrections, the quadrupolar approximation for the spins, and the viscous linear model for tides. We derive the averaged equations of motion in a simplified vectorial formalism, which is suitable to model the long-term evolution of a wide variety of circumbinary systems in very eccentric and inclined orbits. In particular, this vectorial approach can be used to derive constraints for tidal migration, capture in Cassini states, and stellar spin–orbit misalignment. We show that circumbinary planets with initial arbitrary orbital inclination can become coplanar through a secular resonance between the precession of the orbit and the precession of the spin of one of the stars. We also show that circumbinary systems for which the pericenter of the inner orbit is initially in libration present chaotic motion for the spins and for the eccentricity of the outer orbit. Because our model is valid for the non-restricted problem, it can also be applied to any three-body hierarchical system such as star–planet–satellite systems and triple stellar systems.