883 resultados para DDoS attack traceback
Resumo:
Aim: Impacts of invasive species may vary across invasion gradients, owing to trait-based sorting of individuals through dispersal: those aggregating at invasion fronts may be more aggressive and voracious. We examine, in the field and laboratory, variation in the predatory impacts of an invasive Ponto-Caspian crustacean Hemimysis anomala G.O. Sars, 1907 at two sites along a spatio-temporal gradient of invasion.
Location: Republic of Ireland.
Methods: We used reciprocal transplant field-deployed mesocosms to compare predation rates of invasion front and well-established H. anomala on natural zooplankton assemblages. In the laboratory, we measured the functional response (relationship between predation rate and prey supply) of H. anomala from both sites, for a per capita mechanistic comparison of predation efficiency. We also assessed prey selectivity of H. anomala in the mesocosm experiments to further compare feeding behaviour. Finally, we used a correlative approach to assess the community impact of H. anomala across sites, including a nearby uninvaded site, by comparing zooplankton diversities and densities.
Results: Invasion front H. anomala had higher predation rates than well-established H. anomala at high in situ zooplankton densities. Invasion front H. anomala also had higher functional responses - in particular showing higher 'attack rates' - indicating a heightened ability to locate and capture prey. Prey selectivity was consistent across the spatio-temporal contrast, with positive selection for cladocerans. Zooplankton diversity and density declined with time since H. anomala invasion, both being maximal at the uninvaded site.
Main conclusions: Our study, for the first time, (1) reveals differences in predatory per capita effects and associated behavioural traits between two sites along a spatio-temporal invasion gradient and (2) shows a negative community-level impact of the invasive H. anomala in natural water bodies. Further spatio-temporal comparisons of predatory per capita effects of invaders are needed to assess the generality of these results.
Resumo:
Demand for intelligent surveillance in public transport systems is growing due to the increased threats of terrorist attack, vandalism and litigation. The aim of intelligent surveillance is in-time reaction to information received from various monitoring devices, especially CCTV systems. However, video analytic algorithms can only provide static assertions, whilst in reality, many related events happen in sequence and hence should be modeled sequentially. Moreover, analytic algorithms are error-prone, hence how to correct the sequential analytic results based on new evidence (external information or later sensing discovery) becomes an interesting issue. In this paper, we introduce a high-level sequential observation modeling framework which can support revision and update on new evidence. This framework adapts the situation calculus to deal with uncertainty from analytic results. The output of the framework can serve as a foundation for event composition. We demonstrate the significance and usefulness of our framework with a case study of a bus surveillance project.
Resumo:
Adequate silicon fertilization greatly boosts rice yield and mitigates biotic and abiotic stress, and improves grain quality through lowering the content of cadmium and inorganic arsenic. This review on silicon dynamics in rice considers recent advances in our understanding of the role of silicon in rice, and the challenges of maintaining adequate silicon fertility within rice paddy systems. Silicon is increasingly considered as an element required for optimal plant performance, particularly in rice. Plants can survive with very low silicon under laboratory/glasshouse conditions, but this is highly artificial and, thus, silicon can be considered as essential for proper plant function in its environment. Silicon is incorporated into structural components of rice cell walls were it increases cell and tissue rigidity in the plant. Structural silicon provides physical protection to plants against microbial infection and insect attack as well as reducing the quality of the tissue to the predating organisms. The abiotic benefits are due to silicon's effect on overall organ strength. This helps protect against lodging, drought stress, high temperature (through efficient maintenance of transpiration), and photosynthesis by protecting against high UV. Furthermore, silicon also protects the plant from saline stress and against a range of toxic metal stresses (arsenic, cadmium, chromium, copper, nickel and zinc). Added to this, silicon application decreases grain concentrations of various human carcinogens, in particular arsenic, antimony and cadmium. As rice is efficient at stripping bioavailable silicon from the soil, recycling of silicon rich rice straw biomass or addition of inorganic silicon fertilizer, primarily obtained from iron and steel slag, needs careful management. Silicon in the soil may be lost if the silicon-cycle, traditionally achieved via composting of rice straw and returning it to the land, is being broken. As composting of rice straw and incorporation of composted or non-composted straw back to land are resource intensive activities, these activities are declining due to population shifts from the countryside to cities. Processes that accelerate rice straw composting, therefore, need to be identified to aid more efficient use of this resource. In addition, rice genetics may help address declining available silicon in paddy soils: for example by selecting for characteristics during breeding that lead to an increased ability of roots to access recalcitrant silicon sources from soil and/or via selection for traits that aid the maintenance of a high silicon status in shoots. Recent advances in understanding the genetic regulation of silicon uptake and transport by rice plants will aid these goals.
Resumo:
1. Predator–prey interactions are mediated by the structural complexity of habitats, but disentangling the many facets of structure that contribute to this mediation remains elusive. In a world replete with altered landscapes and biological invasions, determining how structure mediates the interactions between predators and novel prey will contribute to our understanding of invasions and predator–prey dynamics in general.
2. Here, using simplified experimental arenas, we manipulate predator-free space, whilst holding surface area and volume constant, to quantify the effects on predator–prey interactions between two resident gammarid predators and an invasive prey, the Ponto-Caspian corophiid Chelicorophium curvispinum.
3. Systematically increasing predator-free space alters the functional responses (the relationship between prey density and consumption rate) of the amphipod predators by reducing attack rates and lengthening handling times. Crucially, functional response shape also changes subtly from destabilizing Type II towards stabilizing Type III, such that small increases in predator-free space to result in significant reductions in prey consumption at low prey densities.
4. Habitats with superficially similar structural complexity can have considerably divergent consequences for prey population stability in general and, particularly, for invasive prey establishing at low densities in novel habitats.
Resumo:
Predicting the ecological impacts of damaging invasive species under relevant environmental contexts is a major challenge, for which comparative functional responses (the relationship between resource availability and consumer uptake rate) have great potential. Here, the functional responses of Gammarus pulex, an ecologically damaging invader in freshwaters in Ireland and other islands, were compared with those of a native trophic equivalent Gammarus duebeni celticus. Experiments were conducted at two dissolved oxygen concentrations (80 and 50 % saturation), representative of anthropogenic water quality changes, using two larval prey, blackfly (Simuliidae spp.) and mayfly (Baetis rhodani). Overall, G. pulex had higher Type II functional responses and hence predatory impacts than G. d. celticus and the functional responses of both predators were reduced by lowered oxygen concentration. However, this reduction was of lower magnitude for the invader as compared to the native. Further, the invader functional response at low oxygen was comparable to that of the native at high oxygen. Attack rates of the two predators were similar, with low oxygen reducing these attack rates, but this effect occurred more strongly for blackfly than mayfly prey. Handling times were significantly lower for the invader compared with the native, and significantly higher at low oxygen, however, the effect of lowered oxygen on handling times was minimal for the invader and pronounced for the native. Maximum feeding rates were significantly greater for the invader compared with the native, and significantly reduced at low oxygen, with this effect again lesser for the invader as compared to the native. The greater functional responses of the invader corroborate with its impacts on recipient macroinvertebrate communities when it replaces the native. Further, our experiments predict that the impact of the invader will be less affected than the native under altered oxygen regimes driven by anthropogenic influences.
Resumo:
As modern power grids move towards becoming a smart grid, there is an increasing reliance on the data that is transmitted and processed by ICT systems. This reliance introduces new digital attack vectors. Many of the proposed approaches that aim to address this problem largely focus on applying well-known ICT security solutions. However, what is needed are approaches that meet the complex concerns of the smart grid as a cyber-physical system. Furthermore, to support the automatic control loops that exist in a power grid, similarly automatic security and resilience mechanisms are needed that rely on minimal operator intervention. The research proposed in this paper aims to develop a framework that ensures resilient smart grid operation in light of successful cyber-attacks.
Resumo:
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.
Resumo:
A Physical Unclonable Function (PUF) can be used to provide authentication of devices by producing die-unique responses. In PUFs based on ring oscillators (ROs), the responses are derived from the oscillation frequencies of the ROs. However, RO PUFs can be vulnerable to attack due to the frequency distribution characteristics of the RO arrays. In this paper, in order to improve the design of RO PUFs for FPGA devices, the frequencies of RO arrays implemented on a large number of FPGA chips are statistically analyzed. Three RO frequency distribution (ROFD) characteristics are observed and discussed. Based on these ROFD characteristics, two RO comparison strategies are proposed that can be used to improve the design of RO PUFs. It is found that the symmetrical RO comparison strategy has the highest entropy density.
Resumo:
We describe a pre-processing correlation attack on an FPGA implementation of AES, protected with a random clocking countermeasure that exhibits complex variations in both the location and amplitude of the power consumption patterns of the AES rounds. It is demonstrated that the merged round patterns can be pre-processed to identify and extract the individual round amplitudes, enabling a successful power analysis attack. We show that the requirement of the random clocking countermeasure to provide a varying execution time between processing rounds can be exploited to select a sub-set of data where sufficient current decay has occurred, further improving the attack. In comparison with the countermeasure's estimated security of 3 million traces from an integration attack, we show that through application of our proposed techniques that the countermeasure can now be broken with as few as 13k traces.
Resumo:
In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.
Resumo:
Understanding animal contests has benefited greatly from employing the concept of fighting ability, termed resource-holding potential (RHP), with body size/weight typically used as a proxy. However, victory does not always go to the larger/heavier contestant and the existing RHP approach thereby fails to accurately predict contest outcome. Aggressiveness, typically studied as a personality trait, might explain part of this discrepancy. We investigated whether aggressiveness forms a component of RHP, examining effects on contest outcome, duration and phases, plus physiological measures of costs (lactate and glucose). Furthermore, using the correct theoretical framework, we provide the first study to investigate whether individuals gather and use information on aggressiveness as part of an assessment strategy. Pigs, Sus scrofa, were assessed for aggressiveness in resident-intruder tests whereby attack latency reflects aggressiveness. Contests were then staged between size-matched animals diverging in aggressiveness. Individuals with a short attack latency in the resident-intruder test almost always initiated the first bite and fight in the subsequent contest. However, aggressiveness had no direct effect on contest outcome, whereas bite initiation did lead to winning in contests without an escalated fight. This indirect effect suggests that aggressiveness is not a component of RHP, but rather reflects a signal of intent. Winner and loser aggressiveness did not affect contest duration or its separate phases, suggesting aggressiveness is not part of an assessment strategy. A greater asymmetry in aggressiveness prolonged contest duration and the duration of displaying, which is in a direction contrary to assessment models based on morphological traits. Blood lactate and glucose increased with contest duration and peaked during escalated fights, highlighting the utility of physiological measures as proxies for fight cost. Integrating personality traits into the study of contest behaviour, as illustrated here, will enhance our understanding of the subtleties of agonistic interactions.
Resumo:
Extracellular vesicles (EVs) released by parasites have important roles in establishing and maintaining infection. Analysis of the soluble and vesicular secretions of adult Fasciola hepatica has established a definitive characterisation of the total secretome of this zoonotic parasite. Fasciola secretes at least two sub-populations of EVs that differ according to size, cargo molecules and site of release from the parasite. The larger EVs are released from the specialised cells that line the parasite gastrodermus and contain the zymogen of the 37 kDa cathepsin L peptidase that performs a digestive function. The smaller exosome-like vesicle population originate from multivesicular bodies within the tegumental syncytium and carry many previously described immunomodulatory molecules that could be delivered into host cells. By integrating our proteomics data with recently available transcriptomic datasets we have detailed the pathways involved with EV biogenesis in F. hepatica and propose that the small exosome biogenesis occurs via ESCRT-dependent MVB formation in the tegumental syncytium before being shed from the apical plasma membrane. Furthermore, we found that the molecular machinery required for EV biogenesis is constitutively expressed across the intra-mammalian development stages of the parasite. By contrast, the cargo molecules packaged within the EVs are developmentally regulated, most likely to facilitate the parasites migration through host tissue and to counteract host immune attack.
Resumo:
This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 210 implementations. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers have been withdrawn from the competition. We have developed a testing framework, BRUTUS, to facilitate automatic detection of simple security lapses and susceptible statistical structures across all ciphers. From this testing, we have security usage notes on four submissions and statistical notes on a further four. We highlight that some of the CAESAR algorithms pose an elevated risk if employed in real-life protocols due to a class of adaptive-chosen-plaintext attacks. Although authenticated encryption with associated data are often defined (and are best used) as discrete primitives that authenticate and transmit only complete messages, in practice, these algorithms are easily implemented in a fashion that outputs observable ciphertext data when the algorithm has not received all of the (attacker-controlled) plaintext. For an implementor, this strategy appears to offer seemingly harmless and compliant storage and latency advantages. If the algorithm uses the same state for secret keying information, encryption, and integrity protection, and the internal mixing permutation is not cryptographically strong, an attacker can exploit the ciphertext–plaintext feedback loop to reveal secret state information or even keying material. We conclude that the main advantages of exhaustive, automated cryptanalysis are that it acts as a very necessary sanity check for implementations and gives the cryptanalyst insights that can be used to focus more specific attack methods on given candidates.
Resumo:
Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.
Resumo:
The complexity of modern SCADA networks and their associated cyber-attacks requires an expressive but flexible manner for representing both domain knowledge and collected intrusion alerts with the ability to integrate them for enhanced analytical capabilities and better understanding of attacks. This paper proposes an ontology-based approach for contextualized intrusion alerts in SCADA networks. In this approach, three security ontologies were developed to represent and store information on intrusion alerts, Modbus communications, and Modbus attack descriptions. This information is correlated into enriched intrusion alerts using simple ontology logic rules written in Semantic Query-Enhanced Web Rules (SQWRL). The contextualized alerts give analysts the means to better understand evolving attacks and to uncover the semantic relationships between sequences of individual attack events. The proposed system is illustrated by two use case scenarios.