730 resultados para DDoS attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In primitively eusocial insect societies, reproductive division of labor is established by dominance-submission interactions which determine a linear dominance hierarchy. As previously observed for other species, in Mischocyttarus cerberus styx (Hymenoptera, Vespidae), the dominant female is the main egg layer. Most of her attacks were to the females directly beneath in the rank establishing a hierarchy. During the pre-emergence stage, the hierarchy was already defined and in the post-emergence stage, pre-male substage, the frequency of dominance interactions were strong but the hierarchy was still maintained by the first-ranked female. In the decline stage there were many neutral individuals which could be the reproductives of a new colony.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tuberculosis (TB) is a serious public health problem all over the world, which was recognized by the WHO in 1993 as a global emergency because of its very high incidence in the 22 countries that concentrate 80% of TB cases. One of these countries is Brazil, where TB occurrences are well-documented in major cities, but little is known of its spread in rural areas and small towns. Therefore, an epidemiological study was done on medical records of TB sufferers in the rural district and small town of Américo Brasiliense, São Paulo state, from 1992 to 2002, with the aim of improving TB prevention and treatment. The results showed that the incidence of TB peaked in the years of intense migration of rural workers, largely cane-cutters. Among these, the disease attacks mainly the men, in their productive years (20 to 40 years old). The predominant clinical form observed was pulmonary tuberculosis. The treatment abandonment rate was less than 1.8%, while the cure rate was around 90%. The disease detection rate by examination of sputum for acid-fast bacilli was around 60%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The study was carried out at the UNESP Rio Claro campus (SP), where biotests consisting of simulated ant attacks were performed in colonies of Mischocyttarus cerberus. The behaviors of the wasps were recorded with a camcorder, for further analysis. This analysis was done using the Mann-Whitney U test and the Principal Component Analysis. In the pre-emergence development stage, colonies with a single foundress defend the nest only after the first larvae appear. When there are only eggs in the nest, the wasp abandons the nest. Before leaving, the wasp rubs its gaster against the nest, releasing the ant repellent secretion. When the nest contains larvae or larvae and pupae, the foundress defends the colony, vibrating its wings, pumping her abdomen and biting the ant.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Automotive parts manufacture by machining process using silicon nitride-based ceramic tool development in Brazil already is a reality. Si 3N4-based ceramic cutting tools offer a high productivity due to their excellent hot hardness, which allows high cutting speeds. Under such conditions the cutting tool must be resistant to a combination of mechanical, thermal and chemical attacks. Silicon nitride based ceramic materials constitute a mature technology with a very broad base of current and potential applications. The best opportunities for Si3N 4-based ceramics include ballistic armor, composite automotive brakes, diesel particulate filters, joint replacement products and others. The goal of this work was to show latter advance in silicon nitride manufacture and its recent evolution on machining process of gray cast iron, compacted graphite iron and Ti-6Al-4V. Materials characterization and machining tests were analyzed by X-Ray Diffraction, Scanning Electron Microscopy, Vickers hardness and toughness fracture and technical norm. In recent works the authors has been proved to advance in microstructural, mechanical and physic properties control. These facts prove that silicon nitride-based ceramic has enough resistance to withstand the impacts inherent to the machining of gray cast iron (CI), compacted graphite iron (CGI) and Ti-6Al-4V (6-4). Copyright © 2008 SAE International.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We report a case of a bather injured by a swordfish in shallow water off the coast of southern Brazil. The victim suffered multiple injuries from the fish's bill, including a puncture wound of his left knee and the tip of the bill remaining as a foreign body. The victim made a full recovery after field management and conservative care. The potential factors leading to this most unusual attack are discussed. © 2009 Wilderness Medical Society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The velvetbean caterpillar Anticarsia gemmatalis Hübner attacks peanut leaves, and the use of resistant varieties has directly contributed to ecological and economic aspects of pest control. The aim of this work was to select resistant peanut genotypes to A. gemmatalis using cluster analyses (dendogram obtained by Ward's methods and K-means) and Principal Components analysis for data interpretation. The evaluated genotypes were: IAC 5, IAC 8112, IAC 22 and IAC Tatu ST with upright growth habit, and IAC 147, IAC 125, IAC Caiapó and IAC Runner 886 with runner growth habit, and soybean genotype BR 16 as a susceptible control. The biological parameters: leaf consumption, larval (4o instar) and pupal (24h old) weight, larval and pupal development time and adult longevity were evaluated at laboratory conditions. The genotypes IAC 147 and IAC Runner 886 were resistant to A. gemmatalis in both cluster tests, grouping apart from most of the other genotypes. Both dendrogram and K-means methods provided satisfactory biological explanation, and they can be complementary used together with Principal Component and vice-versa. These results suggest that cluster analyses may be an important statistical tool in the selection of host plant resistance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A população mundial vem sofrendo, cada vez mais, as conseqüências das agressões efetuadas pelo homem ao meio ambiente, principalmente quanto à ocupação e uso inadequado das terras, o que ocasiona empobrecimento e depauperamento do solo, influenciando na qualidade e disponibilidade de água, levando à destruição das reservas florestais. Assim, é necessária a implantação de políticas públicas, que contemplem o desenvolvimento econômico, urbano, rural e social de uma região, preservando os recursos naturais para futuras gerações. A bacia em estudo está localizada entre as coordenadas UTM 764942; 7546214 e 741816; 7534759, com uma área de 14699,7ha. Este trabalho visou definir as classes de capacidade de uso de terra da microbacia do Ribeirão Pouso Alegre - Jaú (SP) através do Sistema de Informações Geográficas - SPRING. A carta de capacidade de uso da terra foi elaborada a partir do cruzamento das cartas clinográfica e de solo, que foram elaboradas pelo SIG Spring, e o cruzamento de dados foi feito através do LEGAL - Linguagem Espacial para Geoprocessamento Algébrico. Os resultados mostraram que a microbacia é constituída essencialmente pelas classes II e III e o SIG-SPRING permitiu através dos seus módulos discriminarem e quantificar as áreas das classes de terras, declive e capacidade de uso da terra rapidamente.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe a fatal attack by a black caiman (Melanosuchus niger) on an 11-year-old child with comments on the reptile's aggression mechanisms and the conditions under which this kind of incident takes place in the Amazon region. © 2011 Wilderness Medical Society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intrusion detection systems that make use of artificial intelligence techniques in order to improve effectiveness have been actively pursued in the last decade. Neural networks and Support Vector Machines have been also extensively applied to this task. However, their complexity to learn new attacks has become very expensive, making them inviable for a real time retraining. In this research, we introduce a new pattern classifier named Optimum-Path Forest (OPF) to this task, which has demonstrated to be similar to the state-of-the-art pattern recognition techniques, but extremely more efficient for training patterns. Experiments on public datasets showed that OPF classifier may be a suitable tool to detect intrusions on computer networks, as well as allow the algorithm to learn new attacks faster than the other techniques. © 2011 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Detecting misbehavior (such as transmissions of false information) in vehicular ad hoc networks (VANETs) is a very important problem with wide range of implications, including safety related and congestion avoidance applications. We discuss several limitations of existing misbehavior detection schemes (MDS) designed for VANETs. Most MDS are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners, e.g. for gaining access to a particular lane. It is therefore more important to detect false information than to identify misbehaving nodes. We introduce the concept of data-centric misbehavior detection and propose algorithms which detect false alert messages and misbehaving nodes by observing their actions after sending out the alert messages. With the data-centric MDS, each node can decide whether an information received is correct or false. The decision is based on the consistency of recent messages and new alerts with reported and estimated vehicle positions. No voting or majority decisions is needed, making our MDS resilient to Sybil attacks. After misbehavior is detected, we do not revoke all the secret credentials of misbehaving nodes, as done in most schemes. Instead, we impose fines on misbehaving nodes (administered by the certification authority), discouraging them to act selfishly. This reduces the computation and communication costs involved in revoking all the secret credentials of misbehaving nodes. © 2011 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Malicious programs (malware) can cause severe damage on computer systems and data. The mechanism that the human immune system uses to detect and protect from organisms that threaten the human body is efficient and can be adapted to detect malware attacks. In this paper we propose a system to perform malware distributed collection, analysis and detection, this last inspired by the human immune system. After collecting malware samples from Internet, they are dynamically analyzed so as to provide execution traces at the operating system level and network flows that are used to create a behavioral model and to generate a detection signature. Those signatures serve as input to a malware detector, acting as the antibodies in the antigen detection process. This allows us to understand the malware attack and aids in the infection removal procedures. © 2012 Springer-Verlag.