909 resultados para privilege escalation attack
Resumo:
Most bacterial genomes harbor restriction-modification systems, encoding a REase and its cognate MTase. On attack by a foreign DNA, the REase recognizes it as nonself and subjects it to restriction. Should REases be highly specific for targeting the invading foreign DNA? It is often considered to be the case. However, when bacteria harboring a promiscuous or high-fidelity variant of the REase were challenged with bacteriophages, fitness was maximal under conditions of catalytic promiscuity. We also delineate possible mechanisms by which the REase recognizes the chromosome as self at the noncanonical sites, thereby preventing lethal dsDNA breaks. This study provides a fundamental understanding of how bacteria exploit an existing defense system to gain fitness advantage during a host-parasite coevolutionary ``arms race.''
Resumo:
TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.
Resumo:
In the present work, we experimentally study and demarcate the stall flutter boundaries of a NACA 0012 airfoil at low Reynolds numbers (Re similar to 10(4)) by measuring the forces and flow fields around the airfoil when it is forced to oscillate. The airfoil is placed at large mean angle of attack (alpha(m)), and is forced to undergo small amplitude pitch oscillations, the amplitude (Delta alpha) and frequency (f) of which are systematically varied. The unsteady loads on the oscillating airfoil are directly measured, and are used to calculate the energy transfer to the airfoil from the flow. These measurements indicate that for large mean angles of attack of the airfoil (alpha(m)), there is positive energy transfer to the airfoil over a range of reduced frequencies (k=pi fc/U), indicating that there is a possibility of airfoil excitation or stall flutter even at these low Re (c=chord length). Outside this range of reduced frequencies, the energy transfer is negative and under these conditions the oscillations would be damped. Particle Image Velocimetry (PIV) measurements of the flow around the oscillating airfoil show that the shear layer separates from the leading edge and forms a leading edge vortex, although it is not very clear and distinct due to the low oscillation amplitudes. On the other hand, the shear layer formed after separation is found to clearly move periodically away from the airfoil suction surface and towards it with a phase lag to the airfoil oscillations. The phase of the shear layer motion with respect to the airfoil motions shows a clear difference between the exciting and the damping case.
Resumo:
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
Heat transfer rates measured in front and to the side of a protrusion on an aluminum flat plate subjected to hypersonic flow at zero angle of attack are presented for two flow enthalpies of approximately 2 MJ/kg and 4.5 MJ/kg. Experiments were conducted in the hypersonic shock tunnel (HST2) and free piston driven HST3 at a freestream Mach number of 8. Heat transfer data was obtained for different geometries of the protrusion of a height of 4 mm, which is approximately the local boundary layer thickness. Comparatively high rates of heat transfer were obtained at regions of flow circulation in the separated region, with the hottest spot generally appearing in front of the protuberance. Experimental values showed moderate agreement with existing empirical correlations at higher enthalpy but not at all for the lower enthalpy condition, although the correlations were coined at enthalpy values nearer to the lower value. Schlieren visualization was also done to investigate the flow structures qualitatively.
Resumo:
In this paper, the sliding mode control based guidance laws to intercept stationary targets at a desired impact time are proposed. Then, it is extended to constant velocity targets using the notion of predicted interception. The desired impact time is achieved by selecting the interceptor's lateral acceleration to enforce a sliding mode on a switching surface designed using non-linear engagement dynamics. Numerical simulation results are presented to validate the proposed guidance law for different initial engagement geometries, impact times and salvo attack scenarios
Resumo:
Experiments were conducted to measure the heat flux in the vicinity of a three-dimensional protuberance placed on a flat plate facing a hypersonic flow at zero angle of attack. The effects of flow enthalpy and height of the protuberance on the interference heating in its vicinity were studied. Evidence of disturbed flow with highly three-dimensional characteristics and heightened vorticity was observed near the protrusion. A parametric study by changing the deflection angle of the protuberance was also made. Correlations exist in the open literature for enthalpy values lower than 2 MJ/kg. This effort has yielded a new correlation that is valid for enthalpies up to 6 MJ/kg. The Z-type schlieren technique was used to visualize the flow features qualitatively for one of the flow conditions studied.
Resumo:
n this paper, three-axis autopilot of a tactical flight vehicle has been designed for surface to air application. Both nonlinear and linear design synthesis and analysis have been carried out pertaining to present flight vehicle. Lateral autopilot performance has been compared by tracking lateral acceleration components along yaw and pitch plane at higher angles of attack in presence of side force and aerodynamic nonlinearity. The nonlinear lateral autopilot design is based on dynamic inversion and time scale separation principle. The linear lateral autopilot design is based on three-loop topology. Roll autopilot robustness performance has been enhanced against unmodeled roll disturbances by backstepping technique. Complete performance comparison results of both nonlinear and linear controller based on six degrees of freedom simulation along with stability and robustness studies with respect to plant parameter variation have been discussed in the paper.
Resumo:
In this paper, the approach for assigning cooperative communication of Uninhabited Aerial Vehicles (UAV) to perform multiple tasks on multiple targets is posed as a combinatorial optimization problem. The multiple task such as classification, attack and verification of target using UAV is employed using nature inspired techniques such as Artificial Immune System (AIS), Particle Swarm Optimization (PSO) and Virtual Bee Algorithm (VBA). The nature inspired techniques have an advantage over classical combinatorial optimization methods like prohibitive computational complexity to solve this NP-hard problem. Using the algorithms we find the best sequence in which to attack and destroy the targets while minimizing the total distance traveled or the maximum distance traveled by an UAV. The performance analysis of the UAV to classify, attack and verify the target is evaluated using AIS, PSO and VBA.
Resumo:
A robust suboptimal reentry guidance scheme is presented for a reusable launch vehicle using the recently developed, computationally efficient model predictive static programming. The formulation uses the nonlinear vehicle dynamics with a spherical and rotating Earth, hard constraints for desired terminal conditions, and an innovative cost function having several components with associated weighting factors that can account for path and control constraints in a soft constraint manner, thereby leading to smooth solutions of the guidance parameters. The proposed guidance essentially shapes the trajectory of the vehicle by computing the necessary angle of attack and bank angle that the vehicle should execute. The path constraints are the structural load constraint, thermal load constraint, bounds on the angle of attack, and bounds on the bank angle. In addition, the terminal constraints include the three-dimensional position and velocity vector components at the end of the reentry. Whereas the angle-of-attack command is generated directly, the bank angle command is generated by first generating the required heading angle history and then using it in a dynamic inversion loop considering the heading angle dynamics. Such a two-loop synthesis of bank angle leads to better management of the vehicle trajectory and avoids mathematical complexity as well. Moreover, all bank angle maneuvers have been confined to the middle of the trajectory and the vehicle ends the reentry segment with near-zero bank angle, which is quite desirable. It has also been demonstrated that the proposed guidance has sufficient robustness for state perturbations as well as parametric uncertainties in the model.
Resumo:
We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.
Resumo:
Thermal decomposition of propargyl alcohol (C3H3OH), a molecule of interest in interstellar chemistry and combustion, was investigated using a single pulse shock tube in the temperature ranging from 953 to 1262 K. The products identified include acetylene, propyne, vinylacetylene, propynal, propenal, and benzene. The experimentally observed overall rate constant for thermal decomposition of propargyl alcohol was found to be k = 10((10.17 +/- 0.36)) exp(-39.70 +/- 1.83)/RT) s(-1) Ab initio theoretical calculations were carried out to understand the potential energy surfaces involved in the primary and secondary steps of propargyl alcohol thermal decomposition. Transition state theory was used to predict the rate constants, which were then used and refined in a kinetic simulation of the product profile. The first step in the decomposition is C-O bond dissociation, leading to the formation of two important radicals in combustion, OH and propargyl. This has been used to study the reverse OH propargyl radical reaction, about which there appears to be no prior work. Depending on the site of attack, this reaction leads to propargyl alcohol or propenal, one of the major products at temperatures below 1200 K. A detailed mechanism has been derived to explain all the observed products.
Resumo:
Decarboxylative thioesterification of isatoic anhydrides mediated by benzyl(triethyl)ammonium tetrathiomolybdate gave the corresponding S-alkyl or S-aryl 2-aminobenzenecarbothioate derivatives at 60 degrees C. At ambient temperature, organic disulfides were reductive cleaved in the presence of tetrathiomolybdate to generate thiolate anions in situ; this was followed by attack on isatoic anhydrides to give the corresponding S-alkyl or S-aryl 2-aminobenzenecarbothioate derivatives. Additionally, it was shown that multistep reactions could be performed with tetrathiomolybdate, starting with an alkyl halide as a precursor of an alkyl disulfide, which, in turn, was used for ring opening of isatoic anhydrides.
Resumo:
User authentication is essential for accessing computing resources, network resources, email accounts, online portals etc. To authenticate a user, system stores user credentials (user id and password pair) in system. It has been an interested field problem to discover user password from a system and similarly protecting them against any such possible attack. In this work we show that passwords are still vulnerable to hash chain based and efficient dictionary attacks. Human generated passwords use some identifiable patterns. We have analysed a sample of 19 million passwords, of different lengths, available online and studied the distribution of the symbols in the password strings. We show that the distribution of symbols in user passwords is affected by the native language of the user. From symbol distributions we can build smart and efficient dictionaries, which are smaller in size and their coverage of plausible passwords from Key-space is large. These smart dictionaries make dictionary based attacks practical.
Resumo:
The de novo purine biosynthesis is one of the highly conserved pathways among all organisms and is essential for the cell viability. A clear understanding of the enzymes in this pathway would pave way for the development of antimicrobial and anticancer drugs. Phosphoribosylaminoimidazole-succinocar boxamide (SAICAR) synthetase is one of the enzymes in this pathway that catalyzes ATP dependent ligation of carboxyaminoimidazole ribotide (CAIR) with L-aspartate (ASP). Here, we describe eight crystal structures of this enzyme, in C222(1) and H3 space groups, bound to various substrates and substrate mimics from a hyperthermophilic archaea Pyrococcus horikoshii along with molecular dynamics simulations of the structures with substrates. Complexes exhibit minimal deviation from its apo structure. The CAIR binding site displays a preference for pyrimidine nucleotides. In the ADP.TMP-ASP complex, the ASP binds at a position equivalent to that found in Saccharomyces cerevisiae structure (PDB: 2CNU) and thus, clears the ambiguity regarding ASP's position. A possible mode for the inhibition of the enzyme by CTP and UTP, observed earlier in the yeast enzyme, is clearly illustrated in the structures bound to CMP and UMP. The ADP.Mg2+.PO4.CD/MP complex having a phosphate ion between the ATP and CAIR sites strengthens one of the two probable pathways (proposed in Escherichia coli study) of catalytic mechanism and suggests the possibility of a phosphorylation taking place before the ASP's attack on CAIR. Molecular dynamic simulations of this enzyme along with its substrates at 90 degrees C reveal the relative strengths of substrate binding, possible antagonism and the role of Mg2+ ions. (C) 2015 Elsevier Inc. All rights reserved.