773 resultados para DDoS attacks
Resumo:
Urban Computing (UrC) provides users with the situation-proper information by considering context of users, devices, and social and physical environment in urban life. With social network services, UrC makes it possible for people with common interests to organize a virtual-society through exchange of context information among them. In these cases, people and personal devices are vulnerable to fake and misleading context information which is transferred from unauthorized and unauthenticated servers by attackers. So called smart devices which run automatically on some context events are more vulnerable if they are not prepared for attacks. In this paper, we illustrate some UrC service scenarios, and show important context information, possible threats, protection method, and secure context management for people.
Resumo:
Catastrophic events, such as wars and terrorist attacks, tornadoes and hurricanes, earthquakes, tsunamis, floods and landslides, are always accompanied by a large number of casualties. The size distribution of these casualties has separately been shown to follow approximate power law (PL) distributions. In this paper, we analyze the statistical distributions of the number of victims of catastrophic phenomena, in particular, terrorism, and find double PL behavior. This means that the data sets are better approximated by two PLs instead of a single one. We plot the PL parameters, corresponding to several events, and observe an interesting pattern in the charts, where the lines that connect each pair of points defining the double PLs are almost parallel to each other. A complementary data analysis is performed by means of the computation of the entropy. The results reveal relationships hidden in the data that may trigger a future comprehensive explanation of this type of phenomena.
Resumo:
A crescente preocupação que envolve as questões ambientais a nível mundial, cada vez mais agravadas pelo comportamento irresponsável do Homem, conduziu à criação de métodos de avaliação dos impactes ambientais provocados por produtos e sistemas. Sendo o sector da construção responsável por grande parte desses impactes, é evidente a necessidade de aplicação de medidas que visem mitigar ou, no mínimo, reduzir até valores aceitáveis, essas agressões ao meio ambiente. Nesse âmbito, é natural que tenha surgido a ideia de aplicar uma metodologia tão precisa e rigorosa como a LCA ao sector da construção. No entanto, nos dias de hoje, as preocupações alargaram-se às vertentes social e económica que, juntamente com a vertente ambiental, formam o triângulo de equilíbrio do desenvolvimento sustentável. É precisamente essa avaliação tripartida que esta Dissertação pretende abordar, tentando aprofundar conhecimentos e fornecer alternativas, através da análise crítica, que possam contribuir para a melhoria contínua desta metodologia.
Resumo:
Dissertação de Mestrado apresentada ao Instituto de Contabilidade e Administração do Porto para a obtenção de grau de Mestre em Auditoria, sob a orientação de Luís Silva Rodrigues
Resumo:
Power laws, also known as Pareto-like laws or Zipf-like laws, are commonly used to explain a variety of real world distinct phenomena, often described merely by the produced signals. In this paper, we study twelve cases, namely worldwide technological accidents, the annual revenue of America׳s largest private companies, the number of inhabitants in America׳s largest cities, the magnitude of earthquakes with minimum moment magnitude equal to 4, the total burned area in forest fires occurred in Portugal, the net worth of the richer people in America, the frequency of occurrence of words in the novel Ulysses, by James Joyce, the total number of deaths in worldwide terrorist attacks, the number of linking root domains of the top internet domains, the number of linking root domains of the top internet pages, the total number of human victims of tornadoes occurred in the U.S., and the number of inhabitants in the 60 most populated countries. The results demonstrate the emergence of statistical characteristics, very close to a power law behavior. Furthermore, the parametric characterization reveals complex relationships present at higher level of description.
Resumo:
Catastrophic events, such as wars and terrorist attacks, big tornadoes and hurricanes, huge earthquakes, tsunamis, floods, and landslides, are always accompanied by a large number of casualties. The size distribution of these casualties have separately been shown to follow approximate power law (PL) distributions. In this paper, we analyze the number of victims of catastrophic phenomena, in particular, terrorism, and find double PL behavior. This means that the data set is better approximated by two PLs instead of one. We have plotted the two PL parameters corresponding to all terrorist events occurred in every year, from 1980 to 2010. We observe an interesting pattern in the chart, where the lines, that connect each pair of points defining the double PLs, are roughly aligned to each other.
Resumo:
Muitas instalações municipais são alvo de manutenção permanente, devido ao uso de produtos químicos que provocam a corrosão e degradação dos mais diversos materiais. Esta degradação acarreta custos elevados para os municípios e privação de uso de algumas instalações devido a manutenção curativa ou preventiva. Um estudo adequado do efeito dos produtos utilizados, poderia conduzir à utilização de materiais mais nobres, que aumentasse significativamente o tempo de vida dos produtos mais atacados pela degradação por corrosão, através de estudos que permitissem avaliar a relação custo-benefício e, caso esta fosse favorável, proceder à substituição de determinados componentes em materiais relativamente fracos, por outros com uma maior capacidade para resistir aos ataques produzidos pelo meio em que estão inseridos. Este estudo foi efectuado com vista a estudar a degradação de determinados materiais expostos essencialmente à acção do Cloro em instalações municipais, permitindo assim seleccionar novos materiais que permitissem uma vida útil dos componentes mais alargada, estudando convenientemente a relação custo-benefício. Foi possível observar que a introdução de alguns materiais mais nobres, poderá reduzir drasticamente as operações de manutenção, diminuindo os custos e reduzindo também o tempo de indisponibilidade dos equipamentos municipais.
Resumo:
Hoje em dia, as ameaças são cada vez mais frequentes e sofisticadas, do que alguma vez registado. Todo o tipo de empresas/organizações e informação estão sujeitas a estas ameaças. Estes ataques são cada vez mais recorrentes, deixando para trás um rasto de várias quebras de segurança. Existem uma serie de ciberataques que já deixaram a sua marca na historia. Uma das mais notórias, foi o caso da Estónia em 2007, por um grupo pro-kremlin de Transnístria em que vários servidores governamentais, fornecedores de serviço, servidores da banca, entre outros foram alvo de uma serie de ataques, na sua maioria de DDoS (Distributed Denial of Service1),e botnets2. O seu método era tao complicado que o governo da Estónia achava que estavam a ser apoiados pelo governo russo. Isto resultou na paragem de um país ate que o problema fosse normalizado. Considerado um ato de hacktivismo3 pelo que representava algo muito importante para a população russa, um ícone, “the Bronze Soldier of Tallinn”, um elaborado cemitério da altura soviética que o governo da Estónia queria recolocar. Hoje em dia, não só enfrentamos adversários mais sofisticados, como a informação que valorizam é cada vez mais alargada. Estes grupos conseguem fazer coisas inimagináveis com os bits4 mais aparentemente inócuos de informações recolhidas. Como tal, é preciso tomar medidas para garantir a segurança dos cidadãos quando navegam no ciberespaço, no qual as fronteiras são desconhecidas, onde a regulação é insuficiente e a segurança é ainda muito precoce. No plano nacional pode-se afirmar que Portugal possui as capacidades necessárias à proteção do seu ciberespaço. Com a criação do Centro Nacional de Cibersegurança (CNCS), Portugal atingiu um dos objetivos principais da sua estratégia nacional de cibersegurança, em assegurar um ciberespaço livre e seguro e em implementar as medidas e instrumentos necessários à antecipação, deteção, reação e recuperação de situações que, face à iminência ou ocorrência de incidentes ou ciberataques, ponham em causa o funcionamento dos organismos do estado, das infraestruturas críticas e dos interesses nacionais. Partindo de uma analise à estrutura organizacional da cibersegurança em Portugal este trabalho pretende dar um contributo para o que se considera ser uma necessidade, o desenvolvimento de um quadro situacional para a cibersegurança com o objetivo de melhorar o nível de awareness nacional contribuindo assim para o desenvolvimento do modelo de maturidade do CNCS relativamente á prevenção e deteção de incidentes no ciberespaço nacional. Neste sentido foram formulados um conjunto de estudos com o objetivo de dar a entender ao leitor toda a estrutura de um centro de cibersegurança na qual se destaca a proposta de desenvolvimento de um quadro situacional para a cibersegurança em Portugal.
Resumo:
O fim da Guerra Fria é um caso inédito de mudança pacífica da estrutura internacional, em que os Estados Unidos e a União Soviética transcendem a divisão bipolar para decidir os termos da paz no quadro das instituições que definem o modelo de ordenamento multilateral, consolidando a sua legitimidade. Nesse contexto, ao contrário dos casos precedentes de reconstrução internacional no fim de uma guerra hegemónica, o novo sistema do post-Guerra Fria, caracterizado pela unipolaridade, pela regionalização e pela homogeneização, forma-se num quadro de continuidade institucional. A ordem política do post-Guerra Fria é um sistema misto em que as tensões entre a hierarquia unipolar e a anarquia multipolar, a integração global e a fragmentação regional e a homogeneidade e a heterogeneidade política, ideológica e cultural condicionam as estratégias das potências. As crises internacionais vão pôr à prova a estabilidade da nova ordem e a sua capacidade para garantir mudanças pacíficas. A primeira década do post-Guerra Fria mostra a preponderância dos Estados Unidos e a sua confiança crescente, patente nas Guerras do Golfo Pérsico e dos Balcãs, bem como na crise dos Estreitos da Formosa. A reacção aos atentados do "11 de Setembro" revela uma tentação imperial da potência unipolar, nomeadamente com a invasão do Iraque, que provoca uma crise profunda da comunidade de segurança ocidental. A vulnerabilidade do centro da ordem internacional é confirmada pela crise constitucional europeia e pela crise financeira global. Essas crises não alteram a estrutura de poder mas aceleram a erosão da ordem multilateral e criam um novo quadro de possibilidades para a evolução internacional, que inclui uma escalada dos conflitos num quadro de multipolaridade regional, uma nova polarização entre as potências democráticas conservadoras e uma coligação revisionista autoritária, bem como a restauração de um concerto entre as principais potências internacionais.
Resumo:
Abnormalities in the topology of brain networks may be an important feature and etiological factor for psychogenic non-epileptic seizures (PNES). To explore this possibility, we applied a graph theoretical approach to functional networks based on resting state EEGs from 13 PNES patients and 13 age- and gender-matched controls. The networks were extracted from Laplacian-transformed time-series by a cross-correlation method. PNES patients showed close to normal local and global connectivity and small-world structure, estimated with clustering coefficient, modularity, global efficiency, and small-worldness (SW) metrics, respectively. Yet the number of PNES attacks per month correlated with a weakness of local connectedness and a skewed balance between local and global connectedness quantified with SW, all in EEG alpha band. In beta band, patients demonstrated above-normal resiliency, measured with assortativity coefficient, which also correlated with the frequency of PNES attacks. This interictal EEG phenotype may help improve differentiation between PNES and epilepsy. The results also suggest that local connectivity could be a target for therapeutic interventions in PNES. Selective modulation (strengthening) of local connectivity might improve the skewed balance between local and global connectivity and so prevent PNES events.
Resumo:
Transplantation of insulin secreting cells is regarded as a possible treatment for type 1 diabetes. One major difficulty in this approach is, however, that the transplanted cells are exposed to the patient's inflammatory and autoimmune environment, which originally destroyed their own beta-cells. Therefore, even if a good source of insulin-secreting cells can be identified for transplantation therapy, these cells need to be protected against these destructive influences. The aim of this project was to evaluate, using a clonal mouse beta-cell line, whether genetic engineering of protective genes could be a viable option to allow these cells to survive when transplanted into autoimmune diabetic mice. We demonstrated that transfer of the Bcl-2 anti-apoptotic gene and of several genes specifically interfering with cytokines intracellular signalling pathways, greatly improved resistance of the cells to inflammatory stresses in vitro. We further showed that these modifications did not interfere with the capacity of these cells to correct hyperglycaemia for several months in syngeneic or allogeneic streptozocin-diabetic mice. However, these cells were not protected against autoimmune destruction when transplanted into type 1 diabetic NOD mice. This suggests that in addition to inflammatory attacks by cytokines, autoimmunity very efficiently kills the transplanted cells, indicating that multiple protective mechanisms are required for efficient transplantation of insulin-secreting cells to treat type 1 diabetes.
Resumo:
Microbiological war and terrorist attacks are made to weaken populations by transmitting pathogenic and epidemic microorganisms. These bacteria or viruses are often difficult to diagnose. Anthrax alerts following September 2001 showed that most clinical microbiology laboratories were not adequately prepared, using obsolete diagnostic methods or being too slow to use accurate tools when facing a major threat. Following this period, most microbiology laboratories were prepared for bioterrorism alerts, in order to provide accurate and rapid results, although such events are rare and unexpected. In this review, we describe the organization and preparedness of our clinical microbiology laboratory regarding bioterrorism risk, although its main task is to perform routine diagnostic microbiology tests. To illustrate the difficulties, we briefly describe an anthrax alert.
Resumo:
Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later.
Resumo:
Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.
Resumo:
Increased losses of eggs and chicks resulting from human intrusion (investigator or other) into seabird colonies has been well documented. In 1990/91, I studied the effects of investigator disturbance on aggressive behaviour and breeding success of individual pairs of ring-billed gulls nesting at two colonies near Port Colborne, Ontario. The insular colony was on an artificial breakwall, associated with the Welland Ship Canal, approximately 1 km off the north shore of Lake Erie. The mainland colony was adjacent to the canal approximately 1 km east of the breakwall. The frequencies of adult threat and assault behaviours, chick movement and adult attacks on chicks were recorded by continuous scan sampling 30 min prior to, 30 min during and 60 (2 X 30) min after investigator disturbance. The frequency of threat and assault behaviours increased during the period of investigator activity in the colony while the duration of wingpulls and beakpulls decreased. Significantly more chicks ran ("runners") from their natal territories during disturbances and "runners" were more frequently attacked than "territorial" chicks. No chicks were fatally attacked during disturbance and "runners" returned to their natal territories quickly after disturbance. Breeding success was determined for pairs nesting in study plots subjected to two levels of disturbance (normal and moderate). The disturbance level of each plot differed in visitation frequency and activities performed on each visit. Investigator disturbance had no effect on the hatching success or fledging success (taken as 21 days of age) of ring-billed gull study pairs at either colony.