990 resultados para IDS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Manet security has a lot of open issues. Due to its character-istics, this kind of network needs preventive and corrective protection. Inthis paper, we focus on corrective protection proposing an anomaly IDSmodel for Manet. The design and development of the IDS are consideredin our 3 main stages: normal behavior construction, anomaly detectionand model update. A parametrical mixture model is used for behav-ior modeling from reference data. The associated Bayesian classi¯cationleads to the detection algorithm. MIB variables are used to provide IDSneeded information. Experiments of DoS and scanner attacks validatingthe model are presented as well.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Peer-to-Peer (P2P) networks, it is often desirable to assign node IDs which preserve locality relationships in the underlying topology. Node locality can be embedded into node IDs by utilizing a one dimensional mapping by a Hilbert space filling curve on a vector of network distances from each node to a subset of reference landmark nodes within the network. However this approach is fundamentally limited because while robustness and accuracy might be expected to improve with the number of landmarks, the effectiveness of 1 dimensional Hilbert Curve mapping falls for the curse of dimensionality. This work proposes an approach to solve this issue using Landmark Multidimensional Scaling (LMDS) to reduce a large set of landmarks to a smaller set of virtual landmarks. This smaller set of landmarks has been postulated to represent the intrinsic dimensionality of the network space and therefore a space filling curve applied to these virtual landmarks is expected to produce a better mapping of the node ID space. The proposed approach, the Virtual Landmarks Hilbert Curve (VLHC), is particularly suitable for decentralised systems like P2P networks. In the experimental simulations the effectiveness of the methods is measured by means of the locality preservation derived from node IDs in terms of latency to nearest neighbours. A variety of realistic network topologies are simulated and this work provides strong evidence to suggest that VLHC performs better than either Hilbert Curves or LMDS use independently of each other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pós-graduação em Engenharia Elétrica - FEIS

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this study, 103 unrelated South-American patients with mucopolysaccharidosis type II (MPS II) were investigated aiming at the identification of iduronate-2-sulfatase (IDS) disease causing mutations and the possibility of some insights on the genotype-phenotype correlation The strategy used for genotyping involved the identification of the previously reported inversion/disruption of the IDS gene by PCR and screening for other mutations by PCR/SSCP. The exons with altered mobility on SSCP were sequenced, as well as all the exons of patients with no SSCP alteration. By using this strategy, we were able to find the pathogenic mutation in all patients. Alterations such as inversion/disruption and partial/total deletions of the IDS gene were found in 20/103 (19%) patients. Small insertions/deletions/indels (<22 bp) and point mutations were identified in 83/103 (88%) patients, including 30 novel mutations; except for a higher frequency of small duplications in relation to small deletions, the frequencies of major and minor alterations found in our sample are in accordance with those described in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The maximum O-2 uptake by Rhizopus oligosporus grown in a 200 litre rotating drum bioreactor at 0.5 rpm ranged from 6.7 to 7.6 mmol per min per kg initial dry substrate (IDS), for runs done with 4 baffles each 17 cm wide, and 12 baffles each 5 cm wide. Without baffles, the maximum O-2 uptake rate at 5 rpm was 6.9 mmol/(min.kg IDS), compared to 5.1 mmol/(min.kg IDS) obtained at 0.5 rpm. Therefore O-2 supply is adequate in rotating drum bioreactors as long as slumping flow regimes of the substrate bed are avoided.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Little attention has been given to the contextual politics of service delivery reforms. By focusing on cases of reform in the healthcare sector and, to a lesser extent, in the main policies in the social service sector in India, Mexico and Brazil, this article explores two dimensions of analysis which have enormous relevance in understanding the reach and effectiveness of service delivery reforms: (1) the historical timing of reforms and sectorial baselines, and (2) the degree and institutional locus of local discretion in policy. Findings show that depending on both dimensions, there is an extraordinary variation as to the degree, interests involved and meaning of changes which, in theory, correspond to these countries` commitment to the service delivery reforms, However, consideration of the contextual politics is relevant not for the sake of diversity but for the similarities that this diversity reveals, pointing to underlying analytic dimensions that receive attention in this article.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present a new neuroeconomics model for decision-making applied to the Attention-Deficit/Hyperactivity Disorder (ADHD). The model is based on the hypothesis that decision-making is dependent on the evaluation of expected rewards and risks assessed simultaneously in two decision spaces: the personal (PDS) and the interpersonal emotional spaces (IDS). Motivation to act is triggered by necessities identified in PDS or IDS. The adequacy of an action in fulfilling a given necessity is assumed to be dependent on the expected reward and risk evaluated in the decision spaces. Conflict generated by expected reward and risk influences the easiness (cognitive effort) and the future perspective of the decision-making. Finally, the willingness (not) to act is proposed to be a function of the expected reward (or risk), adequacy, easiness and future perspective. The two most frequent clinical forms are ADHD hyperactive (AD/HDhyp) and ADHD inattentive (AD/HDdin). AD/HDhyp behavior is hypothesized to be a consequence of experiencing high rewarding expectancies for short periods of time, low risk evaluation, and short future perspective for decision-making. AD/HDin is hypothesized to be a consequence of experiencing high rewarding expectancies for long periods of time, low risk evaluation, and long future perspective for decision-making.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of the study was to characterize clinically and biochemically mucopolysaccharidosis type II (MPS II) heterozygotes. Fifty-two women at risk to be a carrier, with a mean age of 34.1 years (range 16-57 years), were evaluated through pedigree analysis, medical history, physical examination, measurement of iduronate sulfatase (IDS) activities in plasma and in leukocytes, quantification of glycosaminoglycans (GAGs) in urine, and analysis of the IDS gene. Eligibility criteria for the study also included being 16 years of age or older and being enrolled in a genetic counselling programme. The pedigree and DNA analyses allowed the identification of 40/52 carriers and 12/52 non-carriers. All women evaluated were clinically healthy, and their levels of urinary GAGs were within normal limits. Median plasma and leukocyte IDS activities found among carriers were significantly lower than the values found for non-carriers; there was, however, an overlap between carriers` and non-carriers` values. Our data suggests that MPS II carriers show lower plasma and leukocyte IDS activities but that this reduction is generally associated neither with changes in levels of urinary GAGs nor with the occurrence of clinical manifestations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives The aim of this study was to histomorphometrically evaluate the influence of interimplant distances (ID) and implant placement depth on bone remodeling around contiguous Morse cone connection implants with `platform-shifting` in a dog model. Material and methods Bilateral mandibular premolars of six dogs were extracted, and after 12 weeks, each dog received 8 implants, four placed 1.5 mm subcrestally (SCL) on one side of the mandible and four placed equicrestally (ECL) on the other side, alternating the ID of 2 and 3 mm. The experimental groups were SCL with IDs of 2 mm (2 SCL) and 3 mm (3 SCL) and ECL with IDs of 2 mm (2 ECL) and 3 mm (3 ECL). Metallic crowns were immediately installed. After 8 weeks, the animals were euthanized and histomorphometric analyses were performed to compare bone remodeling in the groups. Results The SCL groups` indices of crestal bone resorption were significantly lower than those of ECL groups. In addition, the vertical bone resorption around the implants was also numerically inferior in the SCL groups, but without statistical significance. No differences were obtained between the different IDs. All the groups presented similar good levels of bone-to-implant contact and histological bone density. Conclusion The subcrestal placement of contiguous Morse cone connection implants with `platform shifting` was more efficient in preserving the interimplant crestal bone. The IDs of 2 and 3 mm did not affect the bone remodeling significantly under the present conditions. To cite this article:Barros RRM, Novaes AB Jr., Muglia VA, Iezzi G, Piattelli A. Influence of interimplant distances and placement depth on peri-implant bone remodeling of adjacent and immediately loaded Morse cone connection implants: a histomorphometric study in dogs.Clin. Oral Impl. Res. 21, 2010; 371-378.doi: 10.1111/j.1600-0501.2009.01860.x.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este estudo pretende conhecer o nível de divulgação de informação sobre responsabilidade social(RS) e analisar possíveis factores determinantes em 60 municípios portugueses. Assumindo que os municípios utilizam cada vez mais Internet como meio de comunicação com seus stakholders, a metodologia de estudo consistiu na analise de conteúdo dos websites e dos documentos disponíveis para download. com vista a determinar se para cada item de informação necessária é elaboração dos Índices de Divulgação de Informação, que permitissem medir o nível de divulgação de informação de cada município. Como forma de analisar a associação existente entre os índices de divulgação de informação criados e os potenciais factores determinantes, foram efectuados diversos testes ás hipóteses formuladas. Os resultados apontam para níveis de divulgação médios na maioria dos índices analisados. O Índice de Divulgação Total(IDT) apurado foi de 0,46. Para cada bloco de informação, o índice que apresentou um valor mais alto foi o da Informação Económica(IDE) com 0,66, seguindo-se o da Informação Social(IDS) com 0,61 e o Ambiental(IDA) com 0,36. O Índice de divulgação de informação genérica(IDG) sobre o RS foi o qeu apresentou valores mais reduzidos, 0,22. Foi efectuada uma analise univariada e bivariada que surgem vários factores como explicativos dos níveis de divulgação de informação. Da aplicação do Modelo de Regressão Linear Multiplica resulta que o IDG é influenciado pelo facto e o município implementar a Agenda 21 Local(A21L) e a pela percentagem de despesas ambientais nas despesas totais(DAMB);que apenas a elevada percentagem de despesas de licenciados(ESCOL)influência o IDE; e a localização do município(LOC, a A21L e a Carga Fiscal(FISC) tem influência no IDA e que a percentagem de habitantes com idade <19 anos e >65 anos(POPID) influencia negativamente o IDA; por ultimo e no que diz respeito ao Índice de Divulgação Total, a CARAT, a A21L, o possuir Certificação e a FISC influenciam positivamente o IDT, enquanto que a POPID influencia negativamente.