773 resultados para DDoS attacks
Resumo:
In this paper, scale-free networks and their functional robustness with respect to structural perturbations of the network are studied. Two types of perturbations are distinguished: random perturbations and attacks. The robustness of directed and undirected scale-free networks is studied numerically for two different measures and the obtained results are compared. For random perturbations, the results indicate that the strength of the perturbation plays a crucial role. In general, directed scale-free networks are more robust than undirected scale-free networks.
Resumo:
Side-channel attacks (SCA) threaten electronic cryptographic devices and can be carried out by monitoring the physical characteristics of security circuits. Differential Power Analysis (DPA) is one the most widely studied side-channel attacks. Numerous countermeasure techniques, such as Random Delay Insertion (RDI), have been proposed to reduce the risk of DPA attacks against cryptographic devices. The RDI technique was first proposed for microprocessors but it was shown to be unsuccessful when implemented on smartcards as it was vulnerable to a variant of the DPA attack known as the Sliding-Window DPA attack.Previous research by the authors investigated the use of the RDI countermeasure for Field Programmable Gate Array (FPGA) based cryptographic devices. A split-RDI technique wasproposed to improve the security of the RDI countermeasure. A set of critical parameters wasalso proposed that could be utilized in the design stage to optimize a security algorithm designwith RDI in terms of area, speed and power. The authors also showed that RDI is an efficientcountermeasure technique on FPGA in comparison to other countermeasures.In this article, a new RDI logic design is proposed that can be used to cost-efficiently implementRDI on FPGA devices. Sliding-Window DPA and realignment attacks, which were shown to beeffective against RDI implemented on smartcard devices, are performed on the improved RDIFPGA implementation. We demonstrate that these attacks are unsuccessful and we also proposea realignment technique that can be used to demonstrate the weakness of RDI implementations.
Resumo:
This article focuses on the experience of one particular family living amidst the socio-political violence in Northern Ireland to illustrate the impact of a particular traumatic event – a paramilitary assault due to mistaken identity. These attacks are often colloquially referred to as a ‘punishment shootings’ or ‘beatings’. The therapeutic process is described in narrative terms, providing a framework for; understanding the systemic effect on family relationships of the initial problematic ‘storying’ of the event, and the process of ‘re-storying’ a new more coherent narrative that integrates the trauma experience. Thus, temporary family vulnerability becomes transformed into increased family resilience. This process has general applicability in work with traumatized families.
Resumo:
This article considers in detail loyalist paramilitary activity in Northern Ireland since the paramilitary cease-fires of 1994. The continuing nature of contemporary loyalist violence is documented with reference to sectarian attacks against members of the “Other”/Catholic community and associated symbols of that community, violence directed at other loyalists, and the potential for future violence given constitutional uncertainty regarding Northern Ireland's position within the United Kingdom. The article also challenges assumptions within the broader literature of an inability within loyalist paramilitary groups to move beyond violence in the post-cease-fire period with particular reference to their conflict transformation efforts.
Resumo:
The everyday lives of many farm workers in eighteenth- and early nineteenth-century England were intricately and often intimately bound with the lives of animals, the ebb and flow of human life being inseparable from that of animal life. Farmyards, fields, folds as well as barns and stables were all spaces where animals transcended being the mere instruments of capital to instead being obvious co-constituents of the rhythms of existence. Living and working in such close proximity meant that the ‘species barrier’ was crossed and intimacies developed in everyday agricultural practices. Still, the relationship was based upon, if not reducible to, the workings of capital: the animal enrolled as a form of embodied capital, the labourer engaged by the farmer to act upon the animal. And in such relationships intimacies are mirrored by violences: the keeping captive, slaughter, and – occasionally – abuse. In this formative period in which the discourses and policies that continue to inform animal welfare were first formulated, the declining economic and material fortunes of farm workers when juxtaposed to farm animals’ fortune as increasingly ‘cosseted capital’ gave a particular charge to these abuses. Farm animals, and especially horses and cattle, so it is shown, were subjected to a series of violences. Many cases of animal maiming parodied tenderness in their brutality, whilst other attacks on the sexual organs of animals represented complex statements about the ways in which agrarian capitalism regulated all culture. Analysing the changing relationship between humans and animals therefore also helps us to better understand how capitalism mediates – and is mediated by – the non-human as well as the human, and how it defines cultural relations.
Resumo:
In the last century, Islam drew the world’s attention though such phenomena as the Islamic revolution in Iran, the fierce Muslim resistance against the Soviet invasion of Afghanistan, and the assassination of Egypt’s President Sadat by a radical Islamic group. But it was when Osama Bin Laden and his organization Al Qaeda were established to have been behind the 11 September attacks in the US, the age-old images of Islam, the fanatical and belligerent religion threatening what the Western world stands for, were revitalized. The impact of 9/11 attacks was so great that even balanced portrayals of Islam were eclipsed by stereotypical images of a fundamental, anti-Western and warmongering religion that bore the hallmarks of medieval prejudices and rhetoric. The popular image tailored for the Western audience reflected Islam as monolithic, intrinsically aggressive, and determined to engage in religious wars against the interests and values of the Western civilisation.
This book intends to help reduce, at least to a reasonable degree, the impact of sweeping, and at times tendentious, generalisations about Islamic laws of warfare. The main purpose of this book is to place the legal, cultural and historical practices of Islamic wars in their broader socio-political contexts, thereby establishing that there has been no undisputed understanding of what defensive or aggressive warfare entails in Islam, whether in doctrine or in practice.
Resumo:
The effectiveness of nifedipine retard as a treatment for Raynaud's phenomenon was assessed in 15 patients in a placebo controlled double blind study. An associated connective tissue disease was evident in 7 patients. Changes in finger and forearm blood flow (venous occlusion plethysmography), digital skin temperature and digital systolic pressure were measured acutely before and after a 2-week treatment period. Subjective assessment of efficacy was based on patient diary data. In addition alpha 2-adrenoceptor density on platelets was measured before and after chronic nifedipine therapy in both the patient group and in an age-and-sex-matched control group. No significant haemodynamic changes were observed. Nifedipine retard significantly reduced the frequency (p less than 0.05) with no change in either the duration or severity of vasospastic attacks. Side effects were common following nifedipine retard. A reduction in alpha 2-adrenoceptor density on platelets was observed in patients compared to a control group (p less than 0.05). Alpha 2-adrenoceptor density was unchanged following a 2-week treatment period with nifedipine retard. This study concludes that nifedipine retard is not effective in the treatment of Raynaud's phenomenon over a short time course. Patients with Raynaud's phenomenon have reduced alpha 2-adrenoceptor densities on their platelets.
Resumo:
Security devices are vulnerable to Differential Power Analysis (DPA) that reveals the key by monitoring the power consumption of the circuits. In this paper, we present the first DPA attack against an FPGA implementation of the Camellia encryption algorithm with all key sizes and evaluate the DPA resistance of the algorithm. The Camellia cryptographic algorithm involves several different key-dependent intermediate operations including S-Box operations. In previous research, it was believed that the Camellia is stronger than AES due to the additional Whitening phase protecting the S-Box operation. However, we propose an attack that bypasses the Whitening phase and targets the S-Box. In this paper, we also discuss a lowcost countermeasure strategy to protect the Pre-whitening / Post-whitening and FL function of Camellia using Dual-rail Precharged Logic and to protect against attacks of the S-Box using Random Delay Insertion. © 2009 IEEE.
Resumo:
While Northern Ireland experiences relative peace and political stability, its violent past is normalized in murals and commemorations, the language and posturing of opposition politics, segregated communities and social life. In “post-conflict” Northern Ireland, children and youth disproportionately experience paramilitary-style attacks and routine sectarian violence. The violence of poverty and restricted opportunities within communities debilitated by three decades of conflict is masked by a discourse of social, economic and political progress. Drawing on qualitative research, this paper illustrates the continued legacy and impacts of violence on the lives of children and youth living in post-ceasefire Northern Ireland. It discusses the prominence of violence—sectarian, racist, political, “everyday,” domestic, “informal”—in young people's accounts and the impacts on their safety, sense of belonging, identity formation, use of space and emotional well-being. The paper concludes by challenging narrow and reductionist explanations of violence, arguing the need to contextualize these within local, historical, political, cultural and material contexts.
Resumo:
Dual-rail encoding, return-to-spacer protocol, and hazard-free logic can be used to resist power analysis attacks by making energy consumed per clock cycle independent of processed data. Standard dual-rail logic uses a protocol with a single spacer, e.g., all-zeros, which gives rise to energy balancing problems. We address these problems by incorporating two spacers; the spacers alternate between adjacent clock cycles. This guarantees that all gates switch in every clock cycle regardless of the transmitted data values. To generate these dual-rail circuits, an automated tool has been developed. It is capable of converting synchronous netlists into dual-rail circuits and it is interfaced to industry CAD tools. Dual-rail and single-rail benchmarks based upon the advanced encryption standard (AES) have been simulated and compared in order to evaluate the method and the tool.
Resumo:
While WiFi monitoring networks have been deployed in previous research, to date none have assessed live network data from an open access, public environment. In this paper we describe the construction of a replicable, independent WLAN monitoring system and address some of the challenges in analysing the resultant traffic. Analysis of traffic from the system demonstrates that basic traffic information from open-access networks varies over time (temporal inconsistency). The results also show that arbitrary selection of Request-Reply intervals can have a significant effect on Probe and Association frame exchange calculations, which can impact on the ability to detect flooding attacks.
Resumo:
The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more detail at these lower layers than their wired counterparts as they face unique challenges. The remainder of this chapter will investigate three of these challenges where WiFi deviates significantly from that of wired counterparts:
• Attacks Specific to WiFi Networks: Outlining the additional threats which WIDS must account for: Denial of Service, Encryption Bypass and AP Masquerading attacks.
• The Effect of Deployment Architecture on WIDS Performance: Demonstrating that the deployment environment of a network protected by a WIDS can influence the prioritisation of attacks.
• The Importance of Live Data in WiFi Research: Investigating the different choices for research data sources with an emphasis on encouraging live network data collection for future WiFi research.
Resumo:
The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
• Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.
Resumo:
Psychological interventions aimed at seizure management are described with a 14-year-old buy with a learning disability and intractable epilepsy. Baseline records suggested that a majority of tonic seizures and 'drop attacks' were associated with going off to sleep and by environmental 'startles'. Psychological formulation implicated sudden changes in arousal levels as an underlying mechanism of action. Cognitive-behavioural countermeasures were employed to alter arousal levels and processes in different ways in different 'at-risk' situations. A multiple baseline design was used to control for non-specific effects of interventions on non-targeted seizures. Results suggested significant declines in the number of sleep onset and startle-response seizures were attained by these methods. Gains were maintained at 2-month follow-up. (C) 1999 BEA Trading Ltd.
Resumo:
The susceptibility of WiFi networks to Rogue Access Point attacks derives from the lack of identity for 802.11 devices. The most common means of detecting these attacks in current research is through tracking the credentials or the location of unauthorised and possibly malicious APs. In this paper, the authors outline a method of distinguishing WiFi Access Points using 802.11 MAC layer management frame traffic profiles. This system does not require location estimation or credential tracking techniques as used in current research techniques, which are known to be inaccurate. These characteristic management traffic profiles are shown to be unique for each device, tantamount to a MAC identity. The application of this technique to solving Rogue AP attacks under the constraints of an open access, public WiFi environment is discussed with the conclusion that the identity is practically very difficult to forge