945 resultados para low-rate distributed denial of service (DDoS) attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Wireless sensor networks (WSNs) emerge as underlying infrastructures for new classes of large-scale networked embedded systems. However, WSNs system designers must fulfill the quality-of-service (QoS) requirements imposed by the applications (and users). Very harsh and dynamic physical environments and extremely limited energy/computing/memory/communication node resources are major obstacles for satisfying QoS metrics such as reliability, timeliness, and system lifetime. The limited communication range of WSN nodes, link asymmetry, and the characteristics of the physical environment lead to a major source of QoS degradation in WSNs-the ldquohidden node problem.rdquo In wireless contention-based medium access control (MAC) protocols, when two nodes that are not visible to each other transmit to a third node that is visible to the former, there will be a collision-called hidden-node or blind collision. This problem greatly impacts network throughput, energy-efficiency and message transfer delays, and the problem dramatically increases with the number of nodes. This paper proposes H-NAMe, a very simple yet extremely efficient hidden-node avoidance mechanism for WSNs. H-NAMe relies on a grouping strategy that splits each cluster of a WSN into disjoint groups of non-hidden nodes that scales to multiple clusters via a cluster grouping strategy that guarantees no interference between overlapping clusters. Importantly, H-NAMe is instantiated in IEEE 802.15.4/ZigBee, which currently are the most widespread communication technologies for WSNs, with only minor add-ons and ensuring backward compatibility with their protocols standards. H-NAMe was implemented and exhaustively tested using an experimental test-bed based on ldquooff-the-shelfrdquo technology, showing that it increases network throughput and transmission success probability up to twice the values obtained without H-NAMe. H-NAMe effectiveness was also demonstrated in a target tracking application with mobile robots - over a WSN deployment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

IEEE International Conference on Cyber Physical Systems, Networks and Applications (CPSNA'15), Hong Kong, China.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hoje em dia, as ameaças são cada vez mais frequentes e sofisticadas, do que alguma vez registado. Todo o tipo de empresas/organizações e informação estão sujeitas a estas ameaças. Estes ataques são cada vez mais recorrentes, deixando para trás um rasto de várias quebras de segurança. Existem uma serie de ciberataques que já deixaram a sua marca na historia. Uma das mais notórias, foi o caso da Estónia em 2007, por um grupo pro-kremlin de Transnístria em que vários servidores governamentais, fornecedores de serviço, servidores da banca, entre outros foram alvo de uma serie de ataques, na sua maioria de DDoS (Distributed Denial of Service1),e botnets2. O seu método era tao complicado que o governo da Estónia achava que estavam a ser apoiados pelo governo russo. Isto resultou na paragem de um país ate que o problema fosse normalizado. Considerado um ato de hacktivismo3 pelo que representava algo muito importante para a população russa, um ícone, “the Bronze Soldier of Tallinn”, um elaborado cemitério da altura soviética que o governo da Estónia queria recolocar. Hoje em dia, não só enfrentamos adversários mais sofisticados, como a informação que valorizam é cada vez mais alargada. Estes grupos conseguem fazer coisas inimagináveis com os bits4 mais aparentemente inócuos de informações recolhidas. Como tal, é preciso tomar medidas para garantir a segurança dos cidadãos quando navegam no ciberespaço, no qual as fronteiras são desconhecidas, onde a regulação é insuficiente e a segurança é ainda muito precoce. No plano nacional pode-se afirmar que Portugal possui as capacidades necessárias à proteção do seu ciberespaço. Com a criação do Centro Nacional de Cibersegurança (CNCS), Portugal atingiu um dos objetivos principais da sua estratégia nacional de cibersegurança, em assegurar um ciberespaço livre e seguro e em implementar as medidas e instrumentos necessários à antecipação, deteção, reação e recuperação de situações que, face à iminência ou ocorrência de incidentes ou ciberataques, ponham em causa o funcionamento dos organismos do estado, das infraestruturas críticas e dos interesses nacionais. Partindo de uma analise à estrutura organizacional da cibersegurança em Portugal este trabalho pretende dar um contributo para o que se considera ser uma necessidade, o desenvolvimento de um quadro situacional para a cibersegurança com o objetivo de melhorar o nível de awareness nacional contribuindo assim para o desenvolvimento do modelo de maturidade do CNCS relativamente á prevenção e deteção de incidentes no ciberespaço nacional. Neste sentido foram formulados um conjunto de estudos com o objetivo de dar a entender ao leitor toda a estrutura de um centro de cibersegurança na qual se destaca a proposta de desenvolvimento de um quadro situacional para a cibersegurança em Portugal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Animal models of infective endocarditis (IE) induced by high-grade bacteremia revealed the pathogenic roles of Staphylococcus aureus surface adhesins and platelet aggregation in the infection process. In humans, however, S. aureus IE possibly occurs through repeated bouts of low-grade bacteremia from a colonized site or intravenous device. Here we used a rat model of IE induced by continuous low-grade bacteremia to explore further the contributions of S. aureus virulence factors to the initiation of IE. Rats with aortic vegetations were inoculated by continuous intravenous infusion (0.0017 ml/min over 10 h) with 10(6) CFU of Lactococcus lactis pIL253 or a recombinant L. lactis strain expressing an individual S. aureus surface protein (ClfA, FnbpA, BCD, or SdrE) conferring a particular adhesive or platelet aggregation property. Vegetation infection was assessed 24 h later. Plasma was collected at 0, 2, and 6 h postinoculation to quantify the expression of tumor necrosis factor (TNF), interleukin 1α (IL-1α), IL-1β, IL-6, and IL-10. The percentage of vegetation infection relative to that with strain pIL253 (11%) increased when binding to fibrinogen was conferred on L. lactis (ClfA strain) (52%; P = 0.007) and increased further with adhesion to fibronectin (FnbpA strain) (75%; P < 0.001). Expression of fibronectin binding alone was not sufficient to induce IE (BCD strain) (10% of infection). Platelet aggregation increased the risk of vegetation infection (SdrE strain) (30%). Conferring adhesion to fibrinogen and fibronectin favored IL-1β and IL-6 production. Our results, with a model of IE induced by low-grade bacteremia, resembling human disease, extend the essential role of fibrinogen binding in the initiation of S. aureus IE. Triggering of platelet aggregation or an inflammatory response may contribute to or promote the development of IE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this qualitative research study was to foster an understanding of the rehabilitation counselling practice offamilies of the brain-injured. Specifically, the study explores the perceptions of stakeholders in regards to the degree of satisfaction with the quality of service received. Questionnaires were administered, and semi-structured, openended interviews were conducted, with six participating families (n=8). Preliminary data were collected via two instruments: (i) the Family Participant Questionnaire, consisting of participants' sample characteristics, information pertaining to the history of the family, details of the injury, and information relating to the type, use, and need offamily services utilized; and (ii) the Community Integration Questionnaire, a measurement of the degree of social displacementllevel of community integration of the injured family member. Utilizing the procedural steps outlined by Colaizzi's (1978) method of protocol analysis, recommendations for a future program based on related and current family needs are discussed in detail. Substantiating and supporting information are offered to rehabilitation practitioners, educational planners, and policymakers alike, concerning the degree of satisfaction with rehabilitative service, and the means of improving upon the overall quality of health care to families of the brain-injured. Implications for clinical practice and research are also raised for discussion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A certificate of service detailing the career of Lieut.-Colonel Frank Case McCordick. He is noted at being enlisted in the 19th Battalion on the 13th November, 1914. He served in Canada, England and France and was "struck off the strength" November 21, 1918. The certificate is dated 16 October, 1919.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A certificate of service from the Canadian Army for Lt. Col. Frank Edward McCordick. The document describes where he served (United Kingdom, Central Mediterranean, Continental Europe) and the length of his service (1939-1945). Included on the certificate is a list of medals/decorations which include: 1939-45 Star, Italy Star, France and Germany Star, Defence Medal Canadian Volunteer Service Medal and Clasp.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A dedication service program for those who gave their lives during World War II from the city of St. Catharines. The list of over 150 names was to be read aloud and an address made by the Mayor (W.J. Macdonald) with prayers and hymn to follow.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The conclusion of the article reads "good handling during processing and re-implanting could mean the difference between a going operation and financial disaster. But it's up to you to make certain your crew understands and follows proper chute practices. When they do, it will mean more money in your pocket."

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The main objective of the of present study are to study the intraseasonal variability of LLJ and its relation with convective heating of the atmosphere, to establish whether LLJ splits into two branches over the Arabian sea as widely believed, the role of horizonatal wind shear of LLJ in the episodes of intense rainfall events observed over the west coast of India, to perform atmospheric modeling work to test whether small (meso) scale vortices form during intense rainfall events along the west coast; and to study the relation between LLJ and monsoon depression genesis. The results of a study on the evolution of Low Level Jetstream (LLJ) prior to the formation of monsoon depressions are presented. A synoptic model of the temporal evolution of monsoon depression has been produced. There is a systematic temporal evolution of the field of deep convection strength and position of the LLJ axis leading to the genesis of monsoon depression. One of the significant outcomes of the present thesis is that the LLJ plays an important role in the intraseasonal and the interannual variability of Indian monsoon activity. Convection and rainfall are dependent mainly on the cyclonic vorticity in the boundary layer associated with LLJ. Monsoon depression genesis and the episodes of very heavy rainfall along the west coast of India are closely related to the cyclonic shear of the LLJ in the boundary layer and the associated deep convection. Case studies by a mesoscale numerical model (MM5) have shown that the heavy rainfall episodes along the west coast of India are associated with generation of mesoscale cyclonic vortices in the boundary layer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we study a k-out-of-n system with single server who provides service to external customers also. The system consists of two parts:(i) a main queue consisting of customers (failed components of the k-out-of-n system) and (ii) a pool (of finite capacity M) of external customers together with an orbit for external customers who find the pool full. An external customer who finds the pool full on arrival, joins the orbit with probability and with probability 1− leaves the system forever. An orbital customer, who finds the pool full, at an epoch of repeated attempt, returns to orbit with probability (< 1) and with probability 1 − leaves the system forever. We compute the steady state system size probability. Several performance measures are computed, numerical illustrations are provided.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis entitled' On Queues with Interruptions and Repeat or Resumption of Service' introduces several new concepts into queues with service interruption. It is divided into Seven chapters including an introductory chapter. The following are keywords that we use in this thesis: Phase type (PH) distribution, Markovian Arrival Process (MAP), Geometric Distribution, Service Interruption, First in First out (FIFO), threshold random variable and Super threshold random variable. In the second chapter we introduce a new concept called the 'threshold random variable' which competes with interruption time to decide whether to repeat or resume the interrupted service after removal of interruptions. This notion generalizes the work reported so far in queues with service interruptions. In chapter 3 we introduce the concept of what is called 'Super threshold clock' (a random variable) which keeps track of the total interruption time of a customer during his service except when it is realized before completion of interruption in some cases to be discussed in this thesis and in other cases it exactly measures the duration of all interruptions put together. The Super threshold clock is OIl whenever the service is interrupted and is deactivated when service is rendered. Throughout this thesis the first in first out service discipline is followed except for priority queues.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

School of Industrial Fisheries, Cochin University of Science and Technology

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research on autonomous intelligent systems has focused on how robots can robustly carry out missions in uncertain and harsh environments with very little or no human intervention. Robotic execution languages such as RAPs, ESL, and TDL improve robustness by managing functionally redundant procedures for achieving goals. The model-based programming approach extends this by guaranteeing correctness of execution through pre-planning of non-deterministic timed threads of activities. Executing model-based programs effectively on distributed autonomous platforms requires distributing this pre-planning process. This thesis presents a distributed planner for modelbased programs whose planning and execution is distributed among agents with widely varying levels of processor power and memory resources. We make two key contributions. First, we reformulate a model-based program, which describes cooperative activities, into a hierarchical dynamic simple temporal network. This enables efficient distributed coordination of robots and supports deployment on heterogeneous robots. Second, we introduce a distributed temporal planner, called DTP, which solves hierarchical dynamic simple temporal networks with the assistance of the distributed Bellman-Ford shortest path algorithm. The implementation of DTP has been demonstrated successfully on a wide range of randomly generated examples and on a pursuer-evader challenge problem in simulation.