893 resultados para DDoS attack
Resumo:
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.
Resumo:
The availability of electricity is fundamental to modern society. It is at the top of the list of critical infrastructures and its interruption can have severe consequences. This highly important system is now evolving to become more reliable, efficient, and clean. This evolving infrastructure has become known as the smart grid; and these future smart grid systems will rely heavily on ICT. This infrastructure will require many servers and due to the nature of the grid, many of these systems will be geographically diverse requiring communication links. At the heart of this ICT infrastructure will be security. At each level of the smart grid from smart metering right through to remote sensing and control networks, security will be a key factor for system design consideration. With an increased number of ICT systems in place the security risk also increases. In this paper the authors discuss the changing nature of security in relation to the smart grid by looking at the move from legacy systems to more modern smart grid systems. The potential planes of attack for future smart grid systems are identified, and the general anatomy of a cyber-attack is presented. The authors then introduce the various threat levels of different types of attack and the mitigation techniques that could be put in place for each. Finally, the authors' introduce a Phasor Measurement Unit (PMU) communication system (operated by the authors) that can be used as a test-bed for some of the proposed future security research.
Resumo:
TiO2 photocatalysis has demonstrated efficacy as a treatment process for water contaminated with chemical pollutants. When exposed to UVA light TiO2 also demonstrates an effective bactericidal activity. The mechanism of this process has been reported to involve attack by valence band generated hydroxyl radicals. In this study when three common bacterial pathogens, Escherichia coli, Salmonella enterica serovar Enteritidis and Pseudomonas aeruginosa, were exposed to TiO2 and UVA light a substantial decrease in bacterial numbers was observed. Control experiments in which all three pathogens were exposed to UVA light only resulted in a similar reduction in bacterial numbers. Moreover, exposure to UVA light alone resulted in the production of a smaller than average colony phenotype among the surviving bacteria, for all three pathogens examined, a finding which was not observed following treatment with UVA and TiO2. Small slow growing colonies have been described for several pathogenic bacteria and are referred to as small colony variants. Several studies have demonstrated an association between small colony variants and persistent, recurrent and antibiotic resistant infections. We propose that the production of small colony variants of pathogenic bacteria following UVA treatment of drinking water may represent a health hazard. As these small colony variants were not observed with the UVA/TiO2 system this potential hazard is not a risk when using this technology. It would also appear that the bactericidal mechanism is different with the UVA/TiO2 process compared to when UVA light is used alone.
Resumo:
Microcystins (cyclic heptapeptides) are produced by a number of freshwater cyanobacteria and cause concern in potable water supplies due to their acute and chronic toxicity. The present study reports the structural characterization of the degradation products of the photocatalytic oxidation of microcystin-LR, so aiding the mechanistic understanding of this process. TiO2 photocatalysis is a promising technology for removal of these toxins from drinking water. However, before it can be adopted in any practical application it is necessary to have a sufficient knowledge of degradation byproducts and their potential toxicity. Liquid chromatography-mass spectrometry analysis demonstrated that the major destruction pathway of microcystin appears to be initiated via three mechanisms: UV irradiation, hydroxyl radical attack, and oxidation. UV irradiation caused geometrical isomerization of microcystin converting the (4E), (6E) of the Adda configuration to (4E), 6(Z) or 4(Z), 6(E). Hydroxyl radical attack on the conjugated diene structure of Adda moiety produced dihyroxylated products. Further oxidation cleaved the hydroxylated 4-5 and/or 6-7 bond of Adda to form aldehyde or ketone peptide residues, which then were oxidized into the corresponding carboxylic acids. Photocatalysis also hydrolyzed the peptide bond on the ring structure of microcystin to form linear structures although this appeared to be a minor pathway.
Resumo:
While investigating the destruction of the cyanobacterial hepatotoxin microcystin-LR in the presence of phycocyanin pigment via semiconductor photocatalysis, it became apparent that the pigment was catalysing the toxin decomposition. The mechanism of this process in terms of phycocyanin acting as a photo-oxygenation sensitizer via singlet oxygen and superoxide attack is explored. The absorption and fluorescence spectra of phycocyanin have been obtained and data on the properties of the excited state calculated. The established photo-oxygenation sensitizer rose bengal was also used as a catalyst for the photolytic decomposition of microcystin-LR to help elucidate the decomposition mechanism.
Resumo:
Recent research on the textual tradition of Latin versions of the Testimonium Flavianum prompts another enquiry into the original text and the transmission of the famous passage. It is suggested here that the Greek/Latin versions highlight a western/eastern early history of the Testimonium and that in turn directs our attention back to the original circumstances of its composition and publication in the city of Rome in the later years of the first century.Restored to its original historical context, the Testimonium emerges as a carefully crafted attack upon the post-Pauline community of Christ-followers in the city.
Resumo:
Threat prevention with limited security resources is a challenging problem. An optimal strategy is to eectively predict attackers' targets (or goals) based on current available information, and use such predictions to prevent (or disrupt) their planned attacks. In this paper, we propose a game-theoretic framework to address this challenge which encompasses the following three elements. First, we design a method to analyze an attacker's types in order to determine the most plausible type of an attacker. Second, we propose an approach to predict possible targets of an attack and the course of actions that the attackers may take even when the attackers' types are ambiguous. Third, a game-theoretic based strategy is developed to determine the best protection actions for defenders (security resources).
Resumo:
A Physical Unclonable Function (PUF) can be used to provide authentication of devices by producing die-unique responses. In PUFs based on ring oscillators (ROs) the responses are derived from the oscillation frequencies of the ROs. However, RO PUFs can be vulnerable to attack due to the frequency distribution characteristics of the RO arrays. In this letter, in order to improve the design of RO PUFs for FPGA devices, the frequencies of RO arrays implemented on a large number of FPGA chips are statistically analyzed. Three RO frequency distribution (ROFD) characteristics, which can be used to improve the design of RO PUFs are observed and discussed.
Resumo:
Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.
Resumo:
UNLABELLED: Cyclic-di-GMP is a near-ubiquitous bacterial second messenger that is important in localized signal transmission during the control of various processes, including virulence and switching between planktonic and biofilm-based lifestyles. Cyclic-di-GMP is synthesized by GGDEF diguanylate cyclases and hydrolyzed by EAL or HD-GYP phosphodiesterases, with each functional domain often appended to distinct sensory modules. HD-GYP domain proteins have resisted structural analysis, but here we present the first structural representative of this family (1.28 Å), obtained using the unusual Bd1817 HD-GYP protein from the predatory bacterium Bdellovibrio bacteriovorus. Bd1817 lacks the active-site tyrosine present in most HD-GYP family members yet remains an excellent model of their features, sharing 48% sequence similarity with the archetype RpfG. The protein structure is highly modular and thus provides a basis for delineating domain boundaries in other stimulus-dependent homologues. Conserved residues in the HD-GYP family cluster around a binuclear metal center, which is observed complexed to a molecule of phosphate, providing information on the mode of hydroxide ion attack on substrate. The fold and active site of the HD-GYP domain are different from those of EAL proteins, and restricted access to the active-site cleft is indicative of a different mode of activity regulation. The region encompassing the GYP motif has a novel conformation and is surface exposed and available for complexation with binding partners, including GGDEF proteins.
IMPORTANCE: It is becoming apparent that many bacteria use the signaling molecule cyclic-di-GMP to regulate a variety of processes, most notably, transitions between motility and sessility. Importantly, this regulation is central to several traits implicated in chronic disease (adhesion, biofilm formation, and virulence gene expression). The mechanisms of cyclic-di-GMP synthesis via GGDEF enzymes and hydrolysis via EAL enzymes have been suggested by the analysis of several crystal structures, but no information has been available to date for the unrelated HD-GYP class of hydrolases. Here we present the multidomain structure of an unusual member of the HD-GYP family from the predatory bacterium Bdellovibrio bacteriovorus and detail the features that distinguish it from the wider structural family of general HD fold hydrolases. The structure reveals how a binuclear iron center is formed from several conserved residues and provides a basis for understanding HD-GYP family sequence requirements for c-di-GMP hydrolysis.
Resumo:
Predatory Bdellovibrio bacteriovorus bacteria are remarkable in that they attach to, penetrate and digest other Gram-negative bacteria, living and replicating within them until all resources are exhausted, when they escape the prey ghost to invade fresh prey. Remarkable remodeling of both predator and prey cell occurs during this process to allow the Bdellovibrio to exploit the intracellular niche they have worked so hard to enter, keeping the prey "bdelloplast" intact until the end of predatory growth. If one views motile non-predatory bacteria in a light microscope, one is immediately struck by how rare it is for bacteria to collide. This highlights how the cell surface of Bdellovibrio must be specialized and adapted to allow productive collisions and further to allow entry into the prey periplasm and subsequent secretion of hydrolytic enzymes to digest it. Bdellovibrio can, however, also be made to grow artificially without prey; thus, they have a large genome containing both predatory genes and genes for saprophytic heterotrophic growth. Thus, the membrane and outer surface layers are a patchwork of proteins encompassing not only those that have a sole purpose in heterotrophic growth but also many more that are specialized or employed to attach to, enter, remodel, kill and ultimately digest prey cells. There is much that is as yet not understood, but molecular genetic and post-genomic approaches to microbial physiology have enhanced the pioneering biochemical work of four decades ago in characterizing some of the key events and surface protein requirements for prey attack.
Resumo:
Spermatogenesis is a complex process reliant upon interactions between germ cells (GC) and supporting somatic cells. Testicular Sertoli cells (SC) support GCs during maturation through physical attachment, the provision of nutrients, and protection from immunological attack. This role is facilitated by an active cytoskeleton of parallel microtubule arrays that permit transport of nutrients to GCs, as well as translocation of spermatids through the seminiferous epithelium during maturation. It is well established that chemical perturbation of SC microtubule remodelling leads to premature GC exfoliation demonstrating that microtubule remodelling is an essential component of male fertility, yet the genes responsible for this process remain unknown. Using a random ENU mutagenesis approach, we have identified a novel mouse line displaying male-specific infertility, due to a point mutation in the highly conserved ATPase domain of the novel KATANIN p60-related microtubule severing protein Katanin p60 subunit A-like1 (KATNAL1). We demonstrate that Katnal1 is expressed in testicular Sertoli cells (SC) from 15.5 days post-coitum (dpc) and that, consistent with chemical disruption models, loss of function of KATNAL1 leads to male-specific infertility through disruption of SC microtubule dynamics and premature exfoliation of spermatids from the seminiferous epithelium. The identification of KATNAL1 as an essential regulator of male fertility provides a significant novel entry point into advancing our understanding of how SC microtubule dynamics promotes male fertility. Such information will have resonance both for future treatment of male fertility and the development of non-hormonal male contraceptives.
Resumo:
Aim: Impacts of invasive species may vary across invasion gradients, owing to trait-based sorting of individuals through dispersal: those aggregating at invasion fronts may be more aggressive and voracious. We examine, in the field and laboratory, variation in the predatory impacts of an invasive Ponto-Caspian crustacean Hemimysis anomala G.O. Sars, 1907 at two sites along a spatio-temporal gradient of invasion.
Location: Republic of Ireland.
Methods: We used reciprocal transplant field-deployed mesocosms to compare predation rates of invasion front and well-established H. anomala on natural zooplankton assemblages. In the laboratory, we measured the functional response (relationship between predation rate and prey supply) of H. anomala from both sites, for a per capita mechanistic comparison of predation efficiency. We also assessed prey selectivity of H. anomala in the mesocosm experiments to further compare feeding behaviour. Finally, we used a correlative approach to assess the community impact of H. anomala across sites, including a nearby uninvaded site, by comparing zooplankton diversities and densities.
Results: Invasion front H. anomala had higher predation rates than well-established H. anomala at high in situ zooplankton densities. Invasion front H. anomala also had higher functional responses - in particular showing higher 'attack rates' - indicating a heightened ability to locate and capture prey. Prey selectivity was consistent across the spatio-temporal contrast, with positive selection for cladocerans. Zooplankton diversity and density declined with time since H. anomala invasion, both being maximal at the uninvaded site.
Main conclusions: Our study, for the first time, (1) reveals differences in predatory per capita effects and associated behavioural traits between two sites along a spatio-temporal invasion gradient and (2) shows a negative community-level impact of the invasive H. anomala in natural water bodies. Further spatio-temporal comparisons of predatory per capita effects of invaders are needed to assess the generality of these results.
Resumo:
Demand for intelligent surveillance in public transport systems is growing due to the increased threats of terrorist attack, vandalism and litigation. The aim of intelligent surveillance is in-time reaction to information received from various monitoring devices, especially CCTV systems. However, video analytic algorithms can only provide static assertions, whilst in reality, many related events happen in sequence and hence should be modeled sequentially. Moreover, analytic algorithms are error-prone, hence how to correct the sequential analytic results based on new evidence (external information or later sensing discovery) becomes an interesting issue. In this paper, we introduce a high-level sequential observation modeling framework which can support revision and update on new evidence. This framework adapts the situation calculus to deal with uncertainty from analytic results. The output of the framework can serve as a foundation for event composition. We demonstrate the significance and usefulness of our framework with a case study of a bus surveillance project.
Resumo:
Adequate silicon fertilization greatly boosts rice yield and mitigates biotic and abiotic stress, and improves grain quality through lowering the content of cadmium and inorganic arsenic. This review on silicon dynamics in rice considers recent advances in our understanding of the role of silicon in rice, and the challenges of maintaining adequate silicon fertility within rice paddy systems. Silicon is increasingly considered as an element required for optimal plant performance, particularly in rice. Plants can survive with very low silicon under laboratory/glasshouse conditions, but this is highly artificial and, thus, silicon can be considered as essential for proper plant function in its environment. Silicon is incorporated into structural components of rice cell walls were it increases cell and tissue rigidity in the plant. Structural silicon provides physical protection to plants against microbial infection and insect attack as well as reducing the quality of the tissue to the predating organisms. The abiotic benefits are due to silicon's effect on overall organ strength. This helps protect against lodging, drought stress, high temperature (through efficient maintenance of transpiration), and photosynthesis by protecting against high UV. Furthermore, silicon also protects the plant from saline stress and against a range of toxic metal stresses (arsenic, cadmium, chromium, copper, nickel and zinc). Added to this, silicon application decreases grain concentrations of various human carcinogens, in particular arsenic, antimony and cadmium. As rice is efficient at stripping bioavailable silicon from the soil, recycling of silicon rich rice straw biomass or addition of inorganic silicon fertilizer, primarily obtained from iron and steel slag, needs careful management. Silicon in the soil may be lost if the silicon-cycle, traditionally achieved via composting of rice straw and returning it to the land, is being broken. As composting of rice straw and incorporation of composted or non-composted straw back to land are resource intensive activities, these activities are declining due to population shifts from the countryside to cities. Processes that accelerate rice straw composting, therefore, need to be identified to aid more efficient use of this resource. In addition, rice genetics may help address declining available silicon in paddy soils: for example by selecting for characteristics during breeding that lead to an increased ability of roots to access recalcitrant silicon sources from soil and/or via selection for traits that aid the maintenance of a high silicon status in shoots. Recent advances in understanding the genetic regulation of silicon uptake and transport by rice plants will aid these goals.