1000 resultados para Tolerância a intrusões
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
There are some approaches that take advantage of unused computational resources in the Internet nodes - users´ machines. In the last years , the peer-to-peer networks (P2P) have gaining a momentum mainly due to its support for scalability and fault tolerance. However, current P2P architectures present some problems such as nodes overhead due to messages routing, a great amount of nodes reconfigurations when the network topology changes, routing traffic inside a specific network even when the traffic is not directed to a machine of this network, and the lack of a proximity relationship among the P2P nodes and the proximity of these nodes in the IP network. Although some architectures use the information about the nodes distance in the IP network, they use methods that require dynamic information. In this work we propose a P2P architecture to fix the problems afore mentioned. It is composed of three parts. The first part consists of a basic P2P architecture, called SGrid, which maintains a relationship of nodes in the P2P network with their position in the IP network. Its assigns adjacent key regions to nodes of a same organization. The second part is a protocol called NATal (Routing and NAT application layer) that extends the basic architecture in order to remove from the nodes the responsibility of routing messages. The third part consists of a special kind of node, called LSP (Lightware Super-Peer), which is responsible for maintaining the P2P routing table. In addition, this work also presents a simulator that validates the architecture and a module of the Natal protocol to be used in Linux routers
Resumo:
This work develops a robustness analysis with respect to the modeling errors, being applied to the strategies of indirect control using Artificial Neural Networks - ANN s, belong to the multilayer feedforward perceptron class with on-line training based on gradient method (backpropagation). The presented schemes are called Indirect Hybrid Control and Indirect Neural Control. They are presented two Robustness Theorems, being one for each proposed indirect control scheme, which allow the computation of the maximum steady-state control error that will occur due to the modeling error what is caused by the neural identifier, either for the closed loop configuration having a conventional controller - Indirect Hybrid Control, or for the closed loop configuration having a neural controller - Indirect Neural Control. Considering that the robustness analysis is restrict only to the steady-state plant behavior, this work also includes a stability analysis transcription that is suitable for multilayer perceptron class of ANN s trained with backpropagation algorithm, to assure the convergence and stability of the used neural systems. By other side, the boundness of the initial transient behavior is assured by the assumption that the plant is BIBO (Bounded Input, Bounded Output) stable. The Robustness Theorems were tested on the proposed indirect control strategies, while applied to regulation control of simulated examples using nonlinear plants, and its results are presented
Resumo:
The increasing of the number of attacks in the computer networks has been treated with the increment of the resources that are applied directly in the active routers equip-ments of these networks. In this context, the firewalls had been consolidated as essential elements in the input and output control process of packets in a network. With the advent of intrusion detectors systems (IDS), efforts have been done in the direction to incorporate packets filtering based in standards of traditional firewalls. This integration incorporates the IDS functions (as filtering based on signatures, until then a passive element) with the already existing functions in firewall. In opposite of the efficiency due this incorporation in the blockage of signature known attacks, the filtering in the application level provokes a natural retard in the analyzed packets, and it can reduce the machine performance to filter the others packets because of machine resources demand by this level of filtering. This work presents models of treatment for this problem based in the packets re-routing for analysis by a sub-network with specific filterings. The suggestion of implementa- tion of this model aims reducing the performance problem and opening a space for the consolidation of scenes where others not conventional filtering solutions (spam blockage, P2P traffic control/blockage, etc.) can be inserted in the filtering sub-network, without inplying in overload of the main firewall in a corporative network
Resumo:
The greater part of monitoring onshore Oil and Gas environment currently are based on wireless solutions. However, these solutions have a technological configuration that are out-of-date, mainly because analog radios and inefficient communication topologies are used. On the other hand, solutions based in digital radios can provide more efficient solutions related to energy consumption, security and fault tolerance. Thus, this paper evaluated if the Wireless Sensor Network, communication technology based on digital radios, are adequate to monitoring Oil and Gas onshore wells. Percent of packets transmitted with successful, energy consumption, communication delay and routing techniques applied to a mesh topology will be used as metrics to validate the proposal in the different routing techniques through network simulation tool NS-2
Resumo:
The semiconductor technologies evolutions leads devices to be developed with higher processing capability. Thus, those components have been used widely in more fields. Many industrial environment such as: oils, mines, automotives and hospitals are frequently using those devices on theirs process. Those industries activities are direct related to environment and health safe. So, it is quite important that those systems have extra safe features yield more reliability, safe and availability. The reference model eOSI that will be presented by this work is aimed to allow the development of systems under a new view perspective which can improve and make simpler the choice of strategies for fault tolerant. As a way to validate the model na architecture FPGA-based was developed.
Resumo:
Previous works have studied the characteristics and peculiarities of P2P networks, especially security information aspects. Most works, in some way, deal with the sharing of resources and, in particular, the storage of files. This work complements previous studies and adds new definitions relating to this kind of systems. A system for safe storage of files (SAS-P2P) was specified and built, based on P2P technology, using the JXTA platform. This system uses standard X.509 and PKCS # 12 digital certificates, issued and managed by a public key infrastructure, which was also specified and developed based on P2P technology (PKIX-P2P). The information is stored in a special file with XML format which is especially prepared, facilitating handling and interoperability among applications. The intention of developing the SAS-P2P system was to offer a complementary service for Giga Natal network users, through which the participants in this network can collaboratively build a shared storage area, with important security features such as availability, confidentiality, authenticity and fault tolerance. Besides the specification, development of prototypes and testing of the SAS-P2P system, tests of the PKIX-P2P Manager module were also performed, in order to determine its fault tolerance and the effective calculation of the reputation of the certifying authorities participating in the system
Resumo:
Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
Resumo:
Realizou-se este experimento com o objetivo de avaliar a resposta dos porta-enxertos de videira IAC 313 Tropical e IAC 572 Jales a diferentes níveis de alumínio em solução nutritiva. A condução do experimento foi realizada em condições de casa-de-vegetação do Departamento de Produção Vegetal/Área de Horticultura, da Faculdade de Ciências Agronômicas - UNESP/Botucatu. Utilizaram-se cinco níveis de alumínio, a saber: 0, 10, 20, 30 e 40 mg L-1. Após a aplicação dos tratamentos, realizaram-se coletas a cada 15 dias para obtenção das variáveis fisiológicas. O delineamento experimental adotado foi o de parcelas subdivididas, inteiramente casualizado e com 3 repetições. Avaliaram-se as variáveis: taxa de crescimento absoluto e relativo, razão de massa foliar e relação parte aérea/raízes. Concluiu-se que o porta-enxerto IAC 572 Jales, quando submetido ao nível de 10mg Al L-1 na solução, apresentou maior taxa de crescimento absoluto e relativo, e maior redistribuição de massa seca das folhas para o restante da planta, ao passo que o porta-enxerto IAC 313 Tropical, quando submetido a esse nível de alumínio, apresentou um decréscimo acentuado nessas variáveis.
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
A mandioca é uma exploração agrícola importante no Estado do Paraná. No entanto, há limitadas informações relacionadas à interferência das plantas daninhas nessa cultura. Objetivou-se com este trabalho estimar o período crítico de prevenção à interferência (PCPI) na cultura da mandioca (variedade Fécula Branca), nas condições edafoclimáticas do noroeste do Paraná. O experimento foi dividido em dois grupos de tratamentos: com períodos crescentes na presença de plantas daninhas (PAI); e com períodos crescentes na ausência de plantas daninhas (PTPI). Foram identificadas as espécies de plantas daninhas e densidades de infestação na área e calculada a importância relativa (IR), avaliando-se também o estande da cultura e a produtividade de raízes comerciais. As principais plantas daninhas presentes na área e que apresentaram os maiores valores de IR foram Cenchrus echinatus e Brachiaria decumbens. Aceitando-se uma tolerância de redução de produtividade de 5%, o PAI ajustado foi de 18 dias após o plantio da cultura, e o PTPI, de 100 dias. Concluiu-se que o PCPI da cultura para as condições edafoclimáticas do noroeste do Paraná situa-se entre 18 e 100 dias após o plantio.
Resumo:
Complex network analysis is a powerful tool into research of complex systems like brain networks. This work aims to describe the topological changes in neural functional connectivity networks of neocortex and hippocampus during slow-wave sleep (SWS) in animals submited to a novel experience exposure. Slow-wave sleep is an important sleep stage where occurs reverberations of electrical activities patterns of wakeness, playing a fundamental role in memory consolidation. Although its importance there s a lack of studies that characterize the topological dynamical of functional connectivity networks during that sleep stage. There s no studies that describe the topological modifications that novel exposure leads to this networks. We have observed that several topological properties have been modified after novel exposure and this modification remains for a long time. Major part of this changes in topological properties by novel exposure are related to fault tolerance
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
Studies of the germination response of seeds subjected to artificial stresses are provided tools for better understanding of the survivability and adaptation of these species in natural stress conditions such as drought or saline soils, common in agricultural and forest regions, contributing significantly to the development of management strategies. Thus, the purpose of this study was to evaluate the possible effects of water and salt stress on germination of Urochloa decumbens and Urochloa ruziziensis. The test was conducted at the Faculty of Technology of São Paulo, campus of Capon Bonito. The seeds were sown with four replicates of 50 seeds in paper soaked in solutions with the potentials of 0.0, -0.2, -0.4 and -0.8 MPa, induced with polyethylene glycol (PEG 6000) and NaCl. The germination test was conducted at 25 degrees C in the presence of light, evaluating the first test score at seven days after sowing, and weekly germination (normal seedlings) until 35 days. We calculated the index of germination rate. The results allowed the conclusion that water stress causes a greater reduction in force, speed of germination and cumulative germination of seeds of U. decumbens and U. ruziziensis than salt stress. The species U. decumbens showed higher tolerance to water and salt stresses.
Resumo:
The modern technology of materials and structural integrity of pipelines requests the use of inspection tools named inspection pigs to detect, localize and measure the length, width and depth dimensions of the thickness losses of walls of buried and underwater pipelines in service. These tools run them internally, performing and recording measurements, with performance that varies according to the pig s technology. It has been developed recently an instrumented pig technology, called feller pig. This work aims to indicate factors that influence the feller pig technology performance in the detection and in the accuracy of measurement of the length, width and depth dimensions of the thickness losses on the internal surface of an oil pipeline wall under normal conditions of oil pipe inspection with pig. In this work, is made a collection of factors and an analyses of the technology based on the available literature, as well as an experiment to observe the technology and the factors operating. In the experiment, a feeler pig is used in a pipeline built in carbon steel and in operation that flows petroleum, in witch are observed areas with internal thickness losses occurred naturally. Some of these areas and their dimensions taken by automated ultra-sound scanner are compared with the ones indicated by the feller pig. Based on the data collection, on the analysis and on the experiment, the influence of factors object of this research is discussed. It is concluded that, among these, there are factors related to pipe fabrication tolerances, to wear of pig components, to internal adhesive wear of pipeline, to other pipeline damages and to technology characteristics. Finally, actions are suggested to know better, improve and define the applicability of this technology