977 resultados para DDoS attack traceback


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of self-healing in networks that are reconfigurable in the sense that they can change their topology during an attack. Our goal is to maintain connectivity in these networks, even in the presence of repeated adversarial node deletion, by carefully adding edges after each attack. We present a new algorithm, DASH, that provably ensures that: 1) the network stays connected even if an adversary deletes up to all nodes in the network; and 2) no node ever increases its degree by more than 2 log n, where n is the number of nodes initially in the network. DASH is fully distributed; adds new edges only among neighbors of deleted nodes; and has average latency and bandwidth costs that are at most logarithmic in n. DASH has these properties irrespective of the topology of the initial network, and is thus orthogonal and complementary to traditional topology- based approaches to defending against attack. We also prove lower-bounds showing that DASH is asymptotically optimal in terms of minimizing maximum degree increase over multiple attacks. Finally, we present empirical results on power-law graphs that show that DASH performs well in practice, and that it significantly outperforms naive algorithms in reducing maximum degree increase.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many modern networks are \emph{reconfigurable}, in the sense that the topology of the network can be changed by the nodes in the network. For example, peer-to-peer, wireless and ad-hoc networks are reconfigurable. More generally, many social networks, such as a company's organizational chart; infrastructure networks, such as an airline's transportation network; and biological networks, such as the human brain, are also reconfigurable. Modern reconfigurable networks have a complexity unprecedented in the history of engineering, resembling more a dynamic and evolving living animal rather than a structure of steel designed from a blueprint. Unfortunately, our mathematical and algorithmic tools have not yet developed enough to handle this complexity and fully exploit the flexibility of these networks. We believe that it is no longer possible to build networks that are scalable and never have node failures. Instead, these networks should be able to admit small, and maybe, periodic failures and still recover like skin heals from a cut. This process, where the network can recover itself by maintaining key invariants in response to attack by a powerful adversary is what we call \emph{self-healing}. Here, we present several fast and provably good distributed algorithms for self-healing in reconfigurable dynamic networks. Each of these algorithms have different properties, a different set of gaurantees and limitations. We also discuss future directions and theoretical questions we would like to answer. %in the final dissertation that this document is proposed to lead to.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modern networks are large, highly complex and dynamic. Add to that the mobility of the agents comprising many of these networks. It is difficult or even impossible for such systems to be managed centrally in an efficient manner. It is imperative for such systems to attain a degree of self-management. Self-healing i.e. the capability of a system in a good state to recover to another good state in face of an attack, is desirable for such systems. In this paper, we discuss the self-healing model for dynamic reconfigurable systems. In this model, an omniscient adversary inserts or deletes nodes from a network and the algorithm responds by adding a limited number of edges in order to maintain invariants of the network. We look at some of the results in this model and argue for their applicability and further extensions of the results and the model. We also look at some of the techniques we have used in our earlier work, in particular, we look at the idea of maintaining virtual graphs mapped over the existing network and assert that this may be a useful technique to use in many problem domains.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicting ecological impacts of invasive species and identifying potentially damaging future invaders are research priorities. Since damage by invaders is characterized by their depletion of resources, comparisons of the ‘functional response’ (FR; resource uptake rate as a function of resource density) of invaders and natives might predict invader impact. We tested this by comparing FRs of the ecologically damaging ‘world's worst’ invasive fish, the largemouth bass (Micropterus salmoides), with a native equivalent, the Cape kurper (Sandelia capensis), and an emerging invader, the sharptooth catfish (Clarias gariepinus), with the native river goby (Glossogobius callidus), in South Africa, a global invasion hotspot. Using tadpoles (Hyperolius marmoratus) as prey, we found that the invaders consumed significantly more than natives. Attack rates at low prey densities within invader/native comparisons reflected similarities in predatory strategies; however, both invasive species displayed significantly higher Type II FRs than the native comparators. This was driven by significantly lower prey handling times by invaders, resulting in significantly higher maximum feeding rates. The higher FRs of these invaders are thus congruent with, and can predict, their impacts on native communities. Comparative FRs may be a rapid and reliable method for predicting ecological impacts of emerging and future invasive species.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Biodiversity continues to decline at a range of spatial scales and there is an urgent requirement to understand how multiple drivers interact in causing such declines. Further, we require methodologies that can facilitate predictions of the effects of such drivers in the future. Habitat degradation and biological invasions are two of the most important threats to biodiversity and here we investigate their combined effects, both in terms of understanding and predicting impacts on native species. The predatory largemouth bass Micropterus salmoides is one of the World’s Worst Invaders, causing declines in native prey species, and its introduction often coincides with habitat simplification. We investigated the predatory functional response, as a measure of ecological impact, of juvenile largemouth bass in artificial vegetation over a range of habitat complexities (high, intermediate, low and zero). Prey, the female guppy Poecilia reticulata, were representative of native fish. As habitats became less complex, significantly more prey were consumed, since, even although attack rates declined, reduced handling times resulted in higher maximum feeding rates by bass. At all levels of habitat complexity, bass exhibited potentially population destabilising Type II functional responses, with no emergence of more stabilising Type III functional responses as often occurs in predator-prey relationships in complex habitats. Thus, habitat degradation and simplification potentially exacerbate the impact of this invasive species, but even highly complex habitats may ultimately not protect native species. The utilisation of functional responses under varying environmental contexts provides a method for the understanding and prediction of invasive species impacts.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes relay selection in order to increase the physical layer security in multiuser cooperative relay networks with multiple amplify-and-forward (AF) relays, in the presence of multiple eavesdroppers. To strengthen the network security against eavesdropping attack, we present three criteria to select the best relay and user pair. Specifically, criterion I and II study the received signal-to-noise ratio (SNR) at the receivers, and perform the selection by maximizing the SNR ratio of the user to the eavesdroppers. To this end, criterion I relies on both the main and eavesdropper links, while criterion II relies on the main links only. Criterion III is the standard max-min selection criterion,
which maximizes the minimum of the dual-hop channel gains of main links. For the three selection criteria, we examine the system secrecy performance by deriving the analytical expressions for the secrecy outage probability. We also derive the asymptotic analysis for the secrecy outage probability with high main-to eavesdropper ratio (MER). From the asymptotic analysis, an interesting observation is reached: for each criterion, the system diversity order is equivalent to the number of relays regardless of the number of users and eavesdroppers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Shape memory NiTi alloys have been used extensively for medical device applications such as orthopedic, dental, vascular and cardiovascular devices on account of their unique shape memory effect (SME) and super-elasticity (SE). Laser welding is found to be the most suitable method used to fabricate NiTi-based medical components. However, the performance of laser-welded NiTi alloys under corrosive environments is not fully understood and a specific focus on understanding the corrosion fatigue behaviour is not evident in the literature. This study reveals a comparison of corrosion fatigue behaviour of laser-welded and bare NiTi alloys using bending rotation fatigue (BRF) test which was integrated with a specifically designed corrosion cell. The testing environment was Hanks’ solution (simulated body fluid) at 37.5oC. Electrochemical impedance spectroscopic (EIS) measurement was carried out to monitor the change of corrosion resistance at different periods during the BRF test. Experiments indicate that the laser-welded NiTi alloy would be more susceptible to the corrosion fatigue attack than the bare NiTi alloy. This finding can serve as a benchmark for the product designers and engineers to determine the factor of safety of NiTi medical devices fabricated using laser welding.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The availability of electricity is fundamental to modern society. It is at the top of the list of critical infrastructures and its interruption can have severe consequences. This highly important system is now evolving to become more reliable, efficient, and clean. This evolving infrastructure has become known as the smart grid; and these future smart grid systems will rely heavily on ICT. This infrastructure will require many servers and due to the nature of the grid, many of these systems will be geographically diverse requiring communication links. At the heart of this ICT infrastructure will be security. At each level of the smart grid from smart metering right through to remote sensing and control networks, security will be a key factor for system design consideration. With an increased number of ICT systems in place the security risk also increases. In this paper the authors discuss the changing nature of security in relation to the smart grid by looking at the move from legacy systems to more modern smart grid systems. The potential planes of attack for future smart grid systems are identified, and the general anatomy of a cyber-attack is presented. The authors then introduce the various threat levels of different types of attack and the mitigation techniques that could be put in place for each. Finally, the authors' introduce a Phasor Measurement Unit (PMU) communication system (operated by the authors) that can be used as a test-bed for some of the proposed future security research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

TiO2 photocatalysis has demonstrated efficacy as a treatment process for water contaminated with chemical pollutants. When exposed to UVA light TiO2 also demonstrates an effective bactericidal activity. The mechanism of this process has been reported to involve attack by valence band generated hydroxyl radicals. In this study when three common bacterial pathogens, Escherichia coli, Salmonella enterica serovar Enteritidis and Pseudomonas aeruginosa, were exposed to TiO2 and UVA light a substantial decrease in bacterial numbers was observed. Control experiments in which all three pathogens were exposed to UVA light only resulted in a similar reduction in bacterial numbers. Moreover, exposure to UVA light alone resulted in the production of a smaller than average colony phenotype among the surviving bacteria, for all three pathogens examined, a finding which was not observed following treatment with UVA and TiO2. Small slow growing colonies have been described for several pathogenic bacteria and are referred to as small colony variants. Several studies have demonstrated an association between small colony variants and persistent, recurrent and antibiotic resistant infections. We propose that the production of small colony variants of pathogenic bacteria following UVA treatment of drinking water may represent a health hazard. As these small colony variants were not observed with the UVA/TiO2 system this potential hazard is not a risk when using this technology. It would also appear that the bactericidal mechanism is different with the UVA/TiO2 process compared to when UVA light is used alone.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Microcystins (cyclic heptapeptides) are produced by a number of freshwater cyanobacteria and cause concern in potable water supplies due to their acute and chronic toxicity. The present study reports the structural characterization of the degradation products of the photocatalytic oxidation of microcystin-LR, so aiding the mechanistic understanding of this process. TiO2 photocatalysis is a promising technology for removal of these toxins from drinking water. However, before it can be adopted in any practical application it is necessary to have a sufficient knowledge of degradation byproducts and their potential toxicity. Liquid chromatography-mass spectrometry analysis demonstrated that the major destruction pathway of microcystin appears to be initiated via three mechanisms: UV irradiation, hydroxyl radical attack, and oxidation. UV irradiation caused geometrical isomerization of microcystin converting the (4E), (6E) of the Adda configuration to (4E), 6(Z) or 4(Z), 6(E). Hydroxyl radical attack on the conjugated diene structure of Adda moiety produced dihyroxylated products. Further oxidation cleaved the hydroxylated 4-5 and/or 6-7 bond of Adda to form aldehyde or ketone peptide residues, which then were oxidized into the corresponding carboxylic acids. Photocatalysis also hydrolyzed the peptide bond on the ring structure of microcystin to form linear structures although this appeared to be a minor pathway.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While investigating the destruction of the cyanobacterial hepatotoxin microcystin-LR in the presence of phycocyanin pigment via semiconductor photocatalysis, it became apparent that the pigment was catalysing the toxin decomposition. The mechanism of this process in terms of phycocyanin acting as a photo-oxygenation sensitizer via singlet oxygen and superoxide attack is explored. The absorption and fluorescence spectra of phycocyanin have been obtained and data on the properties of the excited state calculated. The established photo-oxygenation sensitizer rose bengal was also used as a catalyst for the photolytic decomposition of microcystin-LR to help elucidate the decomposition mechanism. 

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent research on the textual tradition of Latin versions of the Testimonium Flavianum prompts another enquiry into the original text and the transmission of the famous passage. It is suggested here that the Greek/Latin versions highlight a western/eastern early history of the Testimonium and that in turn directs our attention back to the original circumstances of its composition and publication in the city of Rome in the later years of the first century.Restored to its original historical context, the Testimonium emerges as a carefully crafted attack upon the post-Pauline community of Christ-followers in the city.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Threat prevention with limited security resources is a challenging problem. An optimal strategy is to eectively predict attackers' targets (or goals) based on current available information, and use such predictions to prevent (or disrupt) their planned attacks. In this paper, we propose a game-theoretic framework to address this challenge which encompasses the following three elements. First, we design a method to analyze an attacker's types in order to determine the most plausible type of an attacker. Second, we propose an approach to predict possible targets of an attack and the course of actions that the attackers may take even when the attackers' types are ambiguous. Third, a game-theoretic based strategy is developed to determine the best protection actions for defenders (security resources).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Physical Unclonable Function (PUF) can be used to provide authentication of devices by producing die-unique responses. In PUFs based on ring oscillators (ROs) the responses are derived from the oscillation frequencies of the ROs. However, RO PUFs can be vulnerable to attack due to the frequency distribution characteristics of the RO arrays. In this letter, in order to improve the design of RO PUFs for FPGA devices, the frequencies of RO arrays implemented on a large number of FPGA chips are statistically analyzed. Three RO frequency distribution (ROFD) characteristics, which can be used to improve the design of RO PUFs are observed and discussed.