867 resultados para Intrusion Detection System (IDS)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

A gestão e monitorização de redes é uma necessidade fundamental em qualquer organização, quer seja grande ou pequena. A sua importância tem de ser refletida na eficiência e no aumento de informação útil disponível, contribuindo para uma maior eficácia na realização das tarefas em ambientes tecnologicamente avançados, com elevadas necessidades de desempenho e disponibilidade dos recursos dessa tecnologia. Para alcançar estes objetivos é fundamental possuir as ferramentas de gestão de redes adequadas. Nomeadamente ferramentas de monitorização. A classificação de tráfego também se revela fundamental para garantir a qualidade das comunicações e prevenir ataques indesejados aumentando assim a segurança nas comunicações. Paralelamente, principalmente em organizações grandes, é relevante a inventariação dos equipamentos utilizados numa rede. Neste trabalho pretende-se implementar e colocar em funcionamento um sistema autónomo de monitorização, classificação de protocolos e realização de inventários. Todas estas ferramentas têm como objetivo apoiar os administradores e técnicos de sistemas informáticos. Os estudos das aplicações que melhor se adequam à realidade da organização culminaram num acréscimo de conhecimento e aprendizagem que irão contribuir para um melhor desempenho da rede em que o principal beneficiário será o cidadão.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação para obtenção do Grau de Mestre em Engenharia Eletrotécnica e de Computadores, pela Universidade Nova de Ciências e Tecnologia

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The outcome of the interaction between Biomphalaria and Schistosoma mansoni depends on the response of the host internal defence system (IDS) and the escape mechanisms of the parasite. The aim of this study was to evaluate the responsiveness of the IDS (haemocytes and soluble haemolymph factors) of resistant and susceptible Biomphalaria tenagophila lineages and Biomphalaria glabrata lineages in the presence of in vitro-transformed primary sporocysts and secondary sporocysts obtained from infected B. glabrata. To do this, we assayed the cellular adhesion index (CAI), analysed viability/mortality, used fluorescent markers to evaluate the tegumental damage and transplanted secondary sporocysts. B. tenagophila Taim was more effective against primary and secondary sporocystes than the susceptible lineage and B. glabrata. Compared with secondary sporocysts exposed to B. tenagophila, primary sporocysts showed a higher CAI, a greater percentage of dead sporocysts and were labelled by lectin from Glycine max and Alexa-Fluor 488 fluorescent probes at a higher rate than the secondary sporocysts. However, the two B. tenagophila lineages showed no cercarial shedding after inoculation with secondary sporocysts. Our hypothesis that secondary sporocysts can escape the B. tenagophila IDS cannot be confirmed by the transplantation experiments. These data suggest that there are additional mechanisms involved in the lower susceptibilty of B. tenagophila to S. mansoni infection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a compact portable biosensor to measure arsenic As(III) concentrations in water using Escherichia coli bioreporter cells. Escherichia coli expresses green fluorescent protein in a linearly dependent manner as a function of the arsenic concentration (between 0 and 100 μg/L). The device accommodates a small polydimethylsiloxane microfluidic chip that holds the agarose-encapsulated bacteria, and a complete optical illumination/collection/detection system for automated quantitative fluorescence measurements. The device is capable of sampling water autonomously, controlling the whole measurement, storing and transmitting data over GSM networks. We demonstrate highly reproducible measurements of arsenic in drinking water at 10 and 50 μg/L within 100 and 80 min, respectively.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we propose an endpoint detection system based on the use of several features extracted from each speech frame, followed by a robust classifier (i.e Adaboost and Bagging of decision trees, and a multilayer perceptron) and a finite state automata (FSA). We present results for four different classifiers. The FSA module consisted of a 4-state decision logic that filtered false alarms and false positives. We compare the use of four different classifiers in this task. The look ahead of the method that we propose was of 7 frames, which are the number of frames that maximized the accuracy of the system. The system was tested with real signals recorded inside a car, with signal to noise ratio that ranged from 6 dB to 30dB. Finally we present experimental results demonstrating that the system yields robust endpoint detection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes an automatic hand detection system that combines the Fourier-Mellin Transform along with other computer vision techniques to achieve hand detection in cluttered scene color images. The proposed system uses the Fourier-Mellin Transform as an invariant feature extractor to perform RST invariant hand detection. In a first stage of the system a simple non-adaptive skin color-based image segmentation and an interest point detector based on corners are used in order to identify regions of interest that contains possible matches. A sliding window algorithm is then used to scan the image at different scales performing the FMT calculations only in the previously detected regions of interest and comparing the extracted FM descriptor of the windows with a hand descriptors database obtained from a train image set. The results of the performed experiments suggest the use of Fourier-Mellin invariant features as a promising approach for automatic hand detection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper proposes an automatic hand detection system that combines the Fourier-Mellin Transform along with other computer vision techniques to achieve hand detection in cluttered scene color images. The proposed system uses the Fourier-Mellin Transform as an invariant feature extractor to perform RST invariant hand detection. In a first stage of the system a simple non-adaptive skin color-based image segmentation and an interest point detector based on corners are used in order to identify regions of interest that contains possible matches. A sliding window algorithm is then used to scan the image at different scales performing the FMT calculations only in the previously detected regions of interest and comparing the extracted FM descriptor of the windows with a hand descriptors database obtained from a train image set. The results of the performed experiments suggest the use of Fourier-Mellin invariant features as a promising approach for automatic hand detection.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Työn keskeisimpänä tavoitteena on tutkia SIEM-järjestelmien (Security Information and Event Management) käyttömahdollisuuksia PCI DSS -standardissa (Payment Card IndustryData Security Standard) lähtökohtaisesti ratkaisutoimittajan näkökulmasta. Työ on tehty Cygate Oy:ssä. SIEM on uusi tietoturvan ratkaisualue, jonka käyttöönottoa vauhdittavat erilaiset viralliset sääntelyt kuten luottokorttiyhtiöiden asettama PCI DSS -standardi. SIEM-järjestelmien avulla organisaatiot pystyvät keräämään valmistajariippumattomasti verkon systeemikomponenteista tapahtumatietoja, joiden avulla pystytään näkemään keskitetysti, mitä verkossa on tapahtunut. SIEM:ssa käsitellään sekä historiapohjaisia että reaaliaikaisia tapahtumia ja se toimii organisaatioiden keskitettynä tietoturvaprosessia tukevana hallintatyökaluna. PCI DSS -standardi on hyvin yksityiskohtainen ja sen vaatimusten täyttäminen ei ole yksinkertaista. Vaatimuksenmukaisuutta ei saavuteta hetkessä, vaan siihen liittyvä projekti voi kestää viikoista kuukausiin. Standardin yksi haasteellisimmista asioista on keskitetty lokien hallinta. Maksukorttitietoja käsittelevien ja välittävien organisaatioiden on kerättävä kaikki audit-lokit eri järjestelmistä, jotta maksukorttitietojen käyttöä pystytään luottamuksellisesti seuraamaan. Standardin mukaan organisaatioiden tulee käyttää myös tunkeutumisen ja haavoittuvuuksien havainnointijärjestelmiä mahdollisten tietomurtojen havaitsemiseksi ja estämiseksi. SIEM-järjestelmän avulla saadaan täytettyä PCI DSS -standardin vaativimpia lokien hallintaan liittyviä vaatimuksia ja se tuo samallamonia yksityiskohtaisia parannuksia tukemaan muita standardin vaatimuskohtia. Siitä voi olla hyötyä mm. tunkeutumisen ja haavoittuvuuksien havainnoinnissa. SIEM-järjestelmän hyödyntäminen standardin apuna on kuitenkin erittäin haasteellista. Käyttöönotto vaatii tarkkaa etukäteissuunnittelua ja kokonaisuuksien ymmärtämistä niin ratkaisutoimittajan kuin ratkaisun käyttöönottajan puolelta.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A photonic system has been developed that enables sensitive quantitative determination of reactive oxygen species (ROS) - mainly hydrogen peroxide (H2O2) - in aerosol samples such as airborne nanoparticles and exhaled air from patients. The detection principle relies on the amplification of the absorbance under multiple scattering conditions due to optical path lengthening [1] and [2]. In this study, the presence of cellulose membrane that acts as random medium into the glass optical cell considerably improved the sensitivity of the detection based on colorimetric FOX assay (FeII/orange xylenol). Despite the loss of assay volume (cellulose occupies 75% of cell volume) the limit of detection is enhanced by one order of magnitude reaching the value of 9 nM (H2O2 equivalents). Spectral analysis is performed automatically with a periodicity of 5 to 15 s, giving rise to real-time ROS measurements. Moreover, the elution of air sample into the collection chamber via a micro-diffuser (impinger) enables quantitative determination of ROS contained in or generated from airborne samples. As proof-of-concept the photonic ROS detection system was used in the determination of both ROS generated from traffic pollution and ROS contained in the exhaled breath as lung inflammation biomarkers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Streptococcus suis is an important pig pathogen but it is also zoonotic, i.e. capable of causing diseases in humans. Human S. suis infections are quite uncommon but potentially life-threatening and the pathogen is an emerging public health concern. This Gram-positive bacterium possesses a galabiose-specific (Galalpha1−4Gal) adhesion activity, which has been studied for over 20 years. P-fimbriated Escherichia coli−bacteria also possess a similar adhesin activity targeting the same disaccharide. The galabiose-specific adhesin of S. suis was identified by an affinity proteomics method. No function of the protein identified was formerly known and it was designated streptococcal adhesin P (SadP). The peptide sequence of SadP contains an LPXTG-motif and the protein was proven to be cell wall−anchored. SadP may be multimeric since in SDS-PAGE gel it formed a protein ladder starting from about 200 kDa. The identification was confirmed by producing knockout strains lacking functional adhesin, which had lost their ability to bind to galabiose. The adhesin gene was cloned in a bacterial expression host and properties of the recombinant adhesin were studied. The galabiose-binding properties of the recombinant protein were found to be consistent with previous results obtained studying whole bacterial cells. A live-bacteria application of surface plasmon resonance was set up, and various carbohydrate inhibitors of the galabiose-specific adhesins were studied with this assay. The potencies of the inhibitors were highly dependent on multivalency. Compared with P-fimbriated E. coli, lower concentrations of galabiose derivatives were needed to inhibit the adhesion of S. suis. Multivalent inhibitors of S. suis adhesion were found to be effective at low nanomolar concentrations. To specifically detect galabiose adhesin−expressing S. suis bacteria, a technique utilising magnetic glycoparticles and an ATP bioluminescence bacterial detection system was also developed. The identification and characterisation of the SadP adhesin give valuable information on the adhesion mechanisms of S. suis, and the results of this study may be helpful for the development of novel inhibitors and specific detection methods of this pathogen.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The main objective of the work undertaken here was to develop an appropriate microbial technology to protect the larvae of M.rosenbergii in hatchery from vibriosis. This technology precisely is consisted of a rapid detection system of vibrios and effective antagonistic probiotics for the management of vibrios. The present work was undertaken with the realizations that to stabilize the production process of commercial hatcheries an appropriate, comprehensive and fool proof technology is required primarily for the rapid detection of Vibrio and subsequently for its management. Nine species of Vibrio have been found to be associated with larvae of M. rosenbergii in hatchery. Haemolytic assay of the Vibrio and Aeromonas on prawn blood agar showed that all isolates of V. alginolyticus and Aeromonas sp., from moribund, necrotized larve were haemolytic and the isolates of V.cholerae, V.splendidus II, V.proteolyticus and V.fluvialis from the larvae obtained from apparently healthy larval rearing systems were non-haemolytic. Hydrolytic enzymes such as lipase, chitinase and gelatinase were widespread amongst the Vibrio and Aeromonas isolates. Dominance of V.alginolyticus among the isolates from necrotic larvae and the failure in isolating them from rearing water strongly suggest that they infect larvae and multiply in the larval body and cause mortality in the hatchery. The observation suggested that the isolate V. alginolyticus was a pathogen to the larvae of M.rosenbergii. To sum up, through this work, nine species of Vibrio and genus Aeromonas associated with M.rosenbergii larval rearing systems could be isolated and segregated based on the haemolytic activity and the antibodies (PA bs) for use in diagnosis or epidemiological studies could be produced, based on a virulent culture of V.alginolyticus. This could possibly replace the conventional biochemical tests for identification. As prophylaxis to vibriosis, four isolates of Micrococcus spp. and an isolate of Pseudomonas sp. could be obtained which could possibly be used as antagonistic probiotics in the larval rearing system of M.rosenbergii.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we discuss our research in developing general and systematic method for anomaly detection. The key ideas are to represent normal program behaviour using system call frequencies and to incorporate probabilistic techniques for classification to detect anomalies and intrusions. Using experiments on the sendmail system call data, we demonstrate that we can construct concise and accurate classifiers to detect anomalies. We provide an overview of the approach that we have implemented

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We present a new method to select features for a face detection system using Support Vector Machines (SVMs). In the first step we reduce the dimensionality of the input space by projecting the data into a subset of eigenvectors. The dimension of the subset is determined by a classification criterion based on minimizing a bound on the expected error probability of an SVM. In the second step we select features from the SVM feature space by removing those that have low contributions to the decision function of the SVM.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we present a component based person detection system that is capable of detecting frontal, rear and near side views of people, and partially occluded persons in cluttered scenes. The framework that is described here for people is easily applied to other objects as well. The motivation for developing a component based approach is two fold: first, to enhance the performance of person detection systems on frontal and rear views of people and second, to develop a framework that directly addresses the problem of detecting people who are partially occluded or whose body parts blend in with the background. The data classification is handled by several support vector machine classifiers arranged in two layers. This architecture is known as Adaptive Combination of Classifiers (ACC). The system performs very well and is capable of detecting people even when all components of a person are not found. The performance of the system is significantly better than a full body person detector designed along similar lines. This suggests that the improved performance is due to the components based approach and the ACC data classification structure.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The threats range from explicit, e.g. a person attacking the truck driver, to implicit, e.g. somebody loitering and then fiddling with the exterior of the truck in order to open it. Our goal is a system that is able to recognize a threat instantaneously as they develop. Typical observables of the threats are a person’s activity, presence in a particular zone and the trajectory. The novelty of this paper is an encoding of these threat observables in a semantic, intermediate-level representation, based on low-level visual features that have no intrinsic semantic meaning themselves. The aim of this representation was to bridge the semantic gap between the low-level tracks and motion and the higher-level notion of threats. In our experiments, we demonstrate that our semantic representation is more descriptive for threat detection than directly using low-level features. We find that a person’s activities are the most important elements of this semantic representation, followed by the person’s trajectory. The proposed threat detection system is very accurate: 96.6 % of the tracks are correctly interpreted, when considering the temporal context.