967 resultados para Attack signature model


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We give a relativistic spin network model for quantum gravity based on the Lorentz group and its q-deformation, the Quantum Lorentz Algebra. We propose a combinatorial model for the path integral given by an integral over suitable representations of this algebra. This generalises the state sum models for the case of the four-dimensional rotation group previously studied in gr-qc/9709028. As a technical tool, formulae for the evaluation of relativistic spin networks for the Lorentz group are developed, with some simple examples which show that the evaluation is finite in interesting cases. We conjecture that the `10J' symbol needed in our model has a finite value.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Issue addressed The paper examines the meanings of food safety among food businesses deemed non-compliant and considers the need for an ‘insider perspective’ to inform a more nuanced health promotion practice. Methods In-depth interviews were conducted with 29 food business operators who had been recently deemed ‘non-compliant’ through Council inspection. Result Paradoxically, these ‘non-compliers’ revealed a strong belief in the importance of food safety as well as a desire to comply with the regulations as communicated to them by Environmental Health Officers (EHOs). Conclusions The evidence base of food safety is largely informed by the science of food hazards, yet there is a very important need to illuminate the ‘insider’ experience of food businesses doing food safety on a daily basis. This requires a more socially nuanced appreciation of food businesses beyond the simple dichotomy of compliant/ non-compliant. So what? Armed with a deeper understanding of the social context surrounding food safety practice, it is anticipated that a more balanced, collaborative mode of food safety health promotion could develop which could add to the current signature model of regulation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Abstract A theoretical model is developed for the sound scattered when a sound wave is incident on a cambered aerofoil at non-zero angle of attack. The model is based on the linearization of the Euler equations about a steady subsonic flow, and is an adaptation of previous work which considered incident vortical disturbances. Only high-frequency sound waves are considered. The aerofoil thickness, camber and angle of attack are restricted such that the steady flow past the aerofoil is a small perturbation to a uniform flow. The singular perturbation analysis identifies asymptotic regions around the aerofoil; local 'inner' regions, which scale on the incident wavelength, at the leading and trailing edges of the aerofoil; Fresnel regions emanating from the leading and trailing edges of the aerofoil due to the coalescence of singularities and points of stationary phase; a wake transition region downstream of the aerofoil leading and trailing edge; and an outer region far from the aerofoil and wake. An acoustic boundary layer on the aerofoil surface and within the transition region accounts for the effects of curvature. The final result is a uniformly-valid solution for the far-field sound; the effects of angle of attack, camber and thickness are investigated. © 2013 Cambridge University Press.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

SMS4是用于WAPI的分组密码算法,是国内官方公布的第一个商用密码算法.由于公布时间不长,关于它的安全性研究尚没有公开结果发表.该文研究SMS4密码算法对差分故障攻击的安全性.攻击采用面向字节的随机故障模型,并且结合了差分分析技术.该攻击方法理论上仅需要32个错误密文就可以完全恢复出SMS4的128比特种子密钥.因为实际中故障发生的字节位置是不可能完全平均的,所以实际攻击所需错误密文数将略大于理论值;文中的实验结果也验证了这一事实,恢复SMS4的128bit种子密钥平均大约需要47个错误密文.文章结果显示SMS4对差分故障攻击是脆弱的.为了避免这类攻击,建议用户对加密设备进行保护,阻止攻击者对其进行故障诱导.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Scaling relationships between mean body masses and abundances of species in multitrophic communities continue to be a subject of intense research and debate. The top-down mechanism explored in this paper explains the frequently observed inverse linear relationship between body mass and abundance (i.e., constant biomass) in terms of a balancing of resource biomasses by behaviorally and evolutionarily adapting foragers, and the evolutionary response of resources to this foraging pressure. The mechanism is tested using an allometric, multitrophic community model with a complex food web structure. It is a statistical model describing the evolutionary and population dynamics of tens to hundreds of species in a uniform way. Particularities of the model are the detailed representation of the evolution and interaction of trophic traits to reproduce topological food web patterns, prey switching behavior modeled after experimental observations, and the evolutionary adaptation of attack rates. Model structure and design are discussed. For model states comparable to natural communities, we find that (1) the body-mass-abundance scaling does not depend on the allometric scaling exponent of physiological rates in the form expected from the energetic equivalence rule or other bottom-up theories; (2) the scaling exponent of abundance as a function of body mass is approximately -1, independent of the allometric exponent for physiological rates assumed; (3) removal of top-down control destroys this pattern, and energetic equivalence is recovered. We conclude that the top-down mechanism is active in the model, and that it is a viable alternative to bottom-up mechanisms for controlling body-mass-abundance relations in natural communities.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

George Brecht, an artist best known for his associations with Fluxus, is considered to have made significant contributions to emerging traditions of conceptual art and experimental music in the early 1960s. His Event scores, brief verbal scores that comprised lists of terms or open-ended instructions, provided a signature model for indeterminate composition and were ‘used extensively by virtually every Fluxus artist’. This article revisits Brecht’s early writings and research to argue that, while Event scores were adopted within Fluxus performance, they were intended as much more than performance devices. Specifically, Brecht conceived of his works as ‘structures of experience’ that, by revealing the underlying connections between chanced forms, could enable a kind of enlightenment rooted within an experience of a ‘unified reality’.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In a search for new phenomena in a signature suppressed in the standard model of elementary particles (SM), we compare the inclusive production of events containing a lepton, a photon, significant transverse momentum imbalance (MET), and a jet identified as containing a b-quark, to SM predictions. The search uses data produced in proton-antiproton collisions at 1.96 TeV corresponding to 1.9 fb-1 of integrated luminosity taken with the CDF detector at the Fermilab Tevatron. We find 28 lepton+photon+MET+b events versus an expectation of 31.0+4.1/-3.5 events. If we further require events to contain at least three jets and large total transverse energy, simulations predict that the largest SM source is top-quark pair production with an additional radiated photon, ttbar+photon. In the data we observe 16 ttbar+photon candidate events versus an expectation from SM sources of 11.2+2.3/-2.1. Assuming the difference between the observed number and the predicted non-top-quark total is due to SM top quark production, we estimate the ttg cross section to be 0.15 +- 0.08 pb.