977 resultados para DDoS attack traceback


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks, or more specifically as used here template attacks, have been shown to be extremely efficient at extracting secret keys. Template attacks assume a strong adversarial model, in that an attacker has an identical device with which to profile the power consumption of various operations. This can then be used to efficiently attack the target device. Inherent in this assumption is that the power consumption across the devices under test is somewhat similar. This central tenet of the attack is largely unexplored in the literature with the research community generally performing the profiling stage on the same device as being attacked. This is beneficial for evaluation or penetration testing as it is essentially the best case scenario for an attacker where the model built during the profiling stage matches exactly that of the target device, however it is not necessarily a reflection on how the attack will work in reality. In this work, a large scale evaluation of this assumption is performed, comparing the key recovery performance across 20 identical smart-cards when performing a profiling attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

UNLABELLED: Cyclic-di-GMP is a near-ubiquitous bacterial second messenger that is important in localized signal transmission during the control of various processes, including virulence and switching between planktonic and biofilm-based lifestyles. Cyclic-di-GMP is synthesized by GGDEF diguanylate cyclases and hydrolyzed by EAL or HD-GYP phosphodiesterases, with each functional domain often appended to distinct sensory modules. HD-GYP domain proteins have resisted structural analysis, but here we present the first structural representative of this family (1.28 Å), obtained using the unusual Bd1817 HD-GYP protein from the predatory bacterium Bdellovibrio bacteriovorus. Bd1817 lacks the active-site tyrosine present in most HD-GYP family members yet remains an excellent model of their features, sharing 48% sequence similarity with the archetype RpfG. The protein structure is highly modular and thus provides a basis for delineating domain boundaries in other stimulus-dependent homologues. Conserved residues in the HD-GYP family cluster around a binuclear metal center, which is observed complexed to a molecule of phosphate, providing information on the mode of hydroxide ion attack on substrate. The fold and active site of the HD-GYP domain are different from those of EAL proteins, and restricted access to the active-site cleft is indicative of a different mode of activity regulation. The region encompassing the GYP motif has a novel conformation and is surface exposed and available for complexation with binding partners, including GGDEF proteins.

IMPORTANCE: It is becoming apparent that many bacteria use the signaling molecule cyclic-di-GMP to regulate a variety of processes, most notably, transitions between motility and sessility. Importantly, this regulation is central to several traits implicated in chronic disease (adhesion, biofilm formation, and virulence gene expression). The mechanisms of cyclic-di-GMP synthesis via GGDEF enzymes and hydrolysis via EAL enzymes have been suggested by the analysis of several crystal structures, but no information has been available to date for the unrelated HD-GYP class of hydrolases. Here we present the multidomain structure of an unusual member of the HD-GYP family from the predatory bacterium Bdellovibrio bacteriovorus and detail the features that distinguish it from the wider structural family of general HD fold hydrolases. The structure reveals how a binuclear iron center is formed from several conserved residues and provides a basis for understanding HD-GYP family sequence requirements for c-di-GMP hydrolysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predatory Bdellovibrio bacteriovorus bacteria are remarkable in that they attach to, penetrate and digest other Gram-negative bacteria, living and replicating within them until all resources are exhausted, when they escape the prey ghost to invade fresh prey. Remarkable remodeling of both predator and prey cell occurs during this process to allow the Bdellovibrio to exploit the intracellular niche they have worked so hard to enter, keeping the prey "bdelloplast" intact until the end of predatory growth. If one views motile non-predatory bacteria in a light microscope, one is immediately struck by how rare it is for bacteria to collide. This highlights how the cell surface of Bdellovibrio must be specialized and adapted to allow productive collisions and further to allow entry into the prey periplasm and subsequent secretion of hydrolytic enzymes to digest it. Bdellovibrio can, however, also be made to grow artificially without prey; thus, they have a large genome containing both predatory genes and genes for saprophytic heterotrophic growth. Thus, the membrane and outer surface layers are a patchwork of proteins encompassing not only those that have a sole purpose in heterotrophic growth but also many more that are specialized or employed to attach to, enter, remodel, kill and ultimately digest prey cells. There is much that is as yet not understood, but molecular genetic and post-genomic approaches to microbial physiology have enhanced the pioneering biochemical work of four decades ago in characterizing some of the key events and surface protein requirements for prey attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spermatogenesis is a complex process reliant upon interactions between germ cells (GC) and supporting somatic cells. Testicular Sertoli cells (SC) support GCs during maturation through physical attachment, the provision of nutrients, and protection from immunological attack. This role is facilitated by an active cytoskeleton of parallel microtubule arrays that permit transport of nutrients to GCs, as well as translocation of spermatids through the seminiferous epithelium during maturation. It is well established that chemical perturbation of SC microtubule remodelling leads to premature GC exfoliation demonstrating that microtubule remodelling is an essential component of male fertility, yet the genes responsible for this process remain unknown. Using a random ENU mutagenesis approach, we have identified a novel mouse line displaying male-specific infertility, due to a point mutation in the highly conserved ATPase domain of the novel KATANIN p60-related microtubule severing protein Katanin p60 subunit A-like1 (KATNAL1). We demonstrate that Katnal1 is expressed in testicular Sertoli cells (SC) from 15.5 days post-coitum (dpc) and that, consistent with chemical disruption models, loss of function of KATNAL1 leads to male-specific infertility through disruption of SC microtubule dynamics and premature exfoliation of spermatids from the seminiferous epithelium. The identification of KATNAL1 as an essential regulator of male fertility provides a significant novel entry point into advancing our understanding of how SC microtubule dynamics promotes male fertility. Such information will have resonance both for future treatment of male fertility and the development of non-hormonal male contraceptives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: Impacts of invasive species may vary across invasion gradients, owing to trait-based sorting of individuals through dispersal: those aggregating at invasion fronts may be more aggressive and voracious. We examine, in the field and laboratory, variation in the predatory impacts of an invasive Ponto-Caspian crustacean Hemimysis anomala G.O. Sars, 1907 at two sites along a spatio-temporal gradient of invasion.

Location: Republic of Ireland.

Methods: We used reciprocal transplant field-deployed mesocosms to compare predation rates of invasion front and well-established H. anomala on natural zooplankton assemblages. In the laboratory, we measured the functional response (relationship between predation rate and prey supply) of H. anomala from both sites, for a per capita mechanistic comparison of predation efficiency. We also assessed prey selectivity of H. anomala in the mesocosm experiments to further compare feeding behaviour. Finally, we used a correlative approach to assess the community impact of H. anomala across sites, including a nearby uninvaded site, by comparing zooplankton diversities and densities.

Results: Invasion front H. anomala had higher predation rates than well-established H. anomala at high in situ zooplankton densities. Invasion front H. anomala also had higher functional responses - in particular showing higher 'attack rates' - indicating a heightened ability to locate and capture prey. Prey selectivity was consistent across the spatio-temporal contrast, with positive selection for cladocerans. Zooplankton diversity and density declined with time since H. anomala invasion, both being maximal at the uninvaded site.

Main conclusions: Our study, for the first time, (1) reveals differences in predatory per capita effects and associated behavioural traits between two sites along a spatio-temporal invasion gradient and (2) shows a negative community-level impact of the invasive H. anomala in natural water bodies. Further spatio-temporal comparisons of predatory per capita effects of invaders are needed to assess the generality of these results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Demand for intelligent surveillance in public transport systems is growing due to the increased threats of terrorist attack, vandalism and litigation. The aim of intelligent surveillance is in-time reaction to information received from various monitoring devices, especially CCTV systems. However, video analytic algorithms can only provide static assertions, whilst in reality, many related events happen in sequence and hence should be modeled sequentially. Moreover, analytic algorithms are error-prone, hence how to correct the sequential analytic results based on new evidence (external information or later sensing discovery) becomes an interesting issue. In this paper, we introduce a high-level sequential observation modeling framework which can support revision and update on new evidence. This framework adapts the situation calculus to deal with uncertainty from analytic results. The output of the framework can serve as a foundation for event composition. We demonstrate the significance and usefulness of our framework with a case study of a bus surveillance project.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Adequate silicon fertilization greatly boosts rice yield and mitigates biotic and abiotic stress, and improves grain quality through lowering the content of cadmium and inorganic arsenic. This review on silicon dynamics in rice considers recent advances in our understanding of the role of silicon in rice, and the challenges of maintaining adequate silicon fertility within rice paddy systems. Silicon is increasingly considered as an element required for optimal plant performance, particularly in rice. Plants can survive with very low silicon under laboratory/glasshouse conditions, but this is highly artificial and, thus, silicon can be considered as essential for proper plant function in its environment. Silicon is incorporated into structural components of rice cell walls were it increases cell and tissue rigidity in the plant. Structural silicon provides physical protection to plants against microbial infection and insect attack as well as reducing the quality of the tissue to the predating organisms. The abiotic benefits are due to silicon's effect on overall organ strength. This helps protect against lodging, drought stress, high temperature (through efficient maintenance of transpiration), and photosynthesis by protecting against high UV. Furthermore, silicon also protects the plant from saline stress and against a range of toxic metal stresses (arsenic, cadmium, chromium, copper, nickel and zinc). Added to this, silicon application decreases grain concentrations of various human carcinogens, in particular arsenic, antimony and cadmium. As rice is efficient at stripping bioavailable silicon from the soil, recycling of silicon rich rice straw biomass or addition of inorganic silicon fertilizer, primarily obtained from iron and steel slag, needs careful management. Silicon in the soil may be lost if the silicon-cycle, traditionally achieved via composting of rice straw and returning it to the land, is being broken. As composting of rice straw and incorporation of composted or non-composted straw back to land are resource intensive activities, these activities are declining due to population shifts from the countryside to cities. Processes that accelerate rice straw composting, therefore, need to be identified to aid more efficient use of this resource. In addition, rice genetics may help address declining available silicon in paddy soils: for example by selecting for characteristics during breeding that lead to an increased ability of roots to access recalcitrant silicon sources from soil and/or via selection for traits that aid the maintenance of a high silicon status in shoots. Recent advances in understanding the genetic regulation of silicon uptake and transport by rice plants will aid these goals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:


1. Predator–prey interactions are mediated by the structural complexity of habitats, but disentangling the many facets of structure that contribute to this mediation remains elusive. In a world replete with altered landscapes and biological invasions, determining how structure mediates the interactions between predators and novel prey will contribute to our understanding of invasions and predator–prey dynamics in general.
2. Here, using simplified experimental arenas, we manipulate predator-free space, whilst holding surface area and volume constant, to quantify the effects on predator–prey interactions between two resident gammarid predators and an invasive prey, the Ponto-Caspian corophiid Chelicorophium curvispinum.
3. Systematically increasing predator-free space alters the functional responses (the relationship between prey density and consumption rate) of the amphipod predators by reducing attack rates and lengthening handling times. Crucially, functional response shape also changes subtly from destabilizing Type II towards stabilizing Type III, such that small increases in predator-free space to result in significant reductions in prey consumption at low prey densities.
4. Habitats with superficially similar structural complexity can have considerably divergent consequences for prey population stability in general and, particularly, for invasive prey establishing at low densities in novel habitats.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicting the ecological impacts of damaging invasive species under relevant environmental contexts is a major challenge, for which comparative functional responses (the relationship between resource availability and consumer uptake rate) have great potential. Here, the functional responses of Gammarus pulex, an ecologically damaging invader in freshwaters in Ireland and other islands, were compared with those of a native trophic equivalent Gammarus duebeni celticus. Experiments were conducted at two dissolved oxygen concentrations (80 and 50 % saturation), representative of anthropogenic water quality changes, using two larval prey, blackfly (Simuliidae spp.) and mayfly (Baetis rhodani). Overall, G. pulex had higher Type II functional responses and hence predatory impacts than G. d. celticus and the functional responses of both predators were reduced by lowered oxygen concentration. However, this reduction was of lower magnitude for the invader as compared to the native. Further, the invader functional response at low oxygen was comparable to that of the native at high oxygen. Attack rates of the two predators were similar, with low oxygen reducing these attack rates, but this effect occurred more strongly for blackfly than mayfly prey. Handling times were significantly lower for the invader compared with the native, and significantly higher at low oxygen, however, the effect of lowered oxygen on handling times was minimal for the invader and pronounced for the native. Maximum feeding rates were significantly greater for the invader compared with the native, and significantly reduced at low oxygen, with this effect again lesser for the invader as compared to the native. The greater functional responses of the invader corroborate with its impacts on recipient macroinvertebrate communities when it replaces the native. Further, our experiments predict that the impact of the invader will be less affected than the native under altered oxygen regimes driven by anthropogenic influences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As modern power grids move towards becoming a smart grid, there is an increasing reliance on the data that is transmitted and processed by ICT systems. This reliance introduces new digital attack vectors. Many of the proposed approaches that aim to address this problem largely focus on applying well-known ICT security solutions. However, what is needed are approaches that meet the complex concerns of the smart grid as a cyber-physical system. Furthermore, to support the automatic control loops that exist in a power grid, similarly automatic security and resilience mechanisms are needed that rely on minimal operator intervention. The research proposed in this paper aims to develop a framework that ensures resilient smart grid operation in light of successful cyber-attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Physical Unclonable Function (PUF) can be used to provide authentication of devices by producing die-unique responses. In PUFs based on ring oscillators (ROs), the responses are derived from the oscillation frequencies of the ROs. However, RO PUFs can be vulnerable to attack due to the frequency distribution characteristics of the RO arrays. In this paper, in order to improve the design of RO PUFs for FPGA devices, the frequencies of RO arrays implemented on a large number of FPGA chips are statistically analyzed. Three RO frequency distribution (ROFD) characteristics are observed and discussed. Based on these ROFD characteristics, two RO comparison strategies are proposed that can be used to improve the design of RO PUFs. It is found that the symmetrical RO comparison strategy has the highest entropy density.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe a pre-processing correlation attack on an FPGA implementation of AES, protected with a random clocking countermeasure that exhibits complex variations in both the location and amplitude of the power consumption patterns of the AES rounds. It is demonstrated that the merged round patterns can be pre-processed to identify and extract the individual round amplitudes, enabling a successful power analysis attack. We show that the requirement of the random clocking countermeasure to provide a varying execution time between processing rounds can be exploited to select a sub-set of data where sufficient current decay has occurred, further improving the attack. In comparison with the countermeasure's estimated security of 3 million traces from an integration attack, we show that through application of our proposed techniques that the countermeasure can now be broken with as few as 13k traces.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade, many side channel attacks have been published in academic literature detailing how to efficiently extract secret keys by mounting various attacks, such as differential or correlation power analysis, on cryptosystems. Among the most efficient and widely utilized leakage models involved in these attacks are the Hamming weight and distance models which give a simple, yet effective, approximation of the power consumption for many real-world systems. These leakage models reflect the number of bits switching, which is assumed proportional to the power consumption. However, the actual power consumption changing in the circuits is unlikely to be directly of that form. We, therefore, propose a non-linear leakage model by mapping the existing leakage model via a transform function, by which the changing power consumption is depicted more precisely, hence the attack efficiency can be improved considerably. This has the advantage of utilising a non-linear power model while retaining the simplicity of the Hamming weight or distance models. A modified attack architecture is then suggested to yield the correct key efficiently in practice. Finally, an empirical comparison of the attack results is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Understanding animal contests has benefited greatly from employing the concept of fighting ability, termed resource-holding potential (RHP), with body size/weight typically used as a proxy. However, victory does not always go to the larger/heavier contestant and the existing RHP approach thereby fails to accurately predict contest outcome. Aggressiveness, typically studied as a personality trait, might explain part of this discrepancy. We investigated whether aggressiveness forms a component of RHP, examining effects on contest outcome, duration and phases, plus physiological measures of costs (lactate and glucose). Furthermore, using the correct theoretical framework, we provide the first study to investigate whether individuals gather and use information on aggressiveness as part of an assessment strategy. Pigs, Sus scrofa, were assessed for aggressiveness in resident-intruder tests whereby attack latency reflects aggressiveness. Contests were then staged between size-matched animals diverging in aggressiveness. Individuals with a short attack latency in the resident-intruder test almost always initiated the first bite and fight in the subsequent contest. However, aggressiveness had no direct effect on contest outcome, whereas bite initiation did lead to winning in contests without an escalated fight. This indirect effect suggests that aggressiveness is not a component of RHP, but rather reflects a signal of intent. Winner and loser aggressiveness did not affect contest duration or its separate phases, suggesting aggressiveness is not part of an assessment strategy. A greater asymmetry in aggressiveness prolonged contest duration and the duration of displaying, which is in a direction contrary to assessment models based on morphological traits. Blood lactate and glucose increased with contest duration and peaked during escalated fights, highlighting the utility of physiological measures as proxies for fight cost. Integrating personality traits into the study of contest behaviour, as illustrated here, will enhance our understanding of the subtleties of agonistic interactions.