Search results for "Denial"
showing 10 items of 54 documents
A configurable rule based classful token bucket filter network request scheduler for the lustre file system
2017
HPC file systems today work in a best-effort manner where individual applications can flood the file system with requests, effectively leading to a denial of service for all other tasks. This paper presents a classful Token Bucket Filter (TBF) policy for the Lustre file system. The TBF enforces Remote Procedure Call (RPC) rate limitations based on (potentially complex) Quality of Service (QoS) rules. The QoS rules are enforced in Lustre's Object Storage Servers, where each request is assigned to an automatically created QoS class.The proposed QoS implementation for Lustre enables various features for each class including the support for high-priority and real-time requests even under heavy …
Firewall as a service in SDN OpenFlow network
2015
Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request and install match-action rules in ISPs edge routers. In proposed scenario, ISP runs Software Defined Networking environment where control plane is separated from data plane utilizing OpenFlow protocol and ONOS controller. For interaction between end-users and SDN Controller author defines an Appl…
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic
2016
Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate a targeted business, costing victims millions of dollars in lost revenue and productivity. In this paper, we present a novel method which allows us to timely detect application-layer DDoS attacks that utilize encrypted protocols by applying an anomaly-based approach to statistics extracted from network packets. The method involves construction of a model of normal user behavior with the help of weighted fuzzy clustering. The construction algorithm is self-adaptive and allows one to update the model every time when a new portion of network tr…
Smart Grid Security: A new Approach to Detect Intruders in a Smart Grid Neighborhood Area Network
2016
International audience; In this paper, we propose an efficient and lightweight attack detection mechanism for a smart grid Neighborhood Area Network (NAN) that combine between distributed and centralized intrusion detection. A NAN includes the customers' appliances, smart meters and collectors. The smart meters measure the power consumption of each appliance and the collectors aggregate the measures and forward them to the control center for analysis. Intrusion Detection System (IDS) agents, proposed in our framework, run in a distributed fashion at smart meters level and in a centralized fashion at collector and control center nodes. A combination between a rule-based detection and a learn…
Impaired Self-Awareness and Denial During the Postacute Phases After Moderate to Severe Traumatic Brain Injury.
2020
While a number of empirical studies have appeared on impaired self-awareness (ISA) after traumatic brain injury (TBI) over the last 20 years, the relative role of denial (as a psychological method of coping) has typically not been addressed in these studies. We propose that this failure has limited our understanding of how ISA and denial differentially affect efforts to rehabilitate persons with TBI. In this selective review paper, we summarize early findings in the field and integrate those findings with more recent observations (i.e., 1999-2019). We believe that this synthesis of information and expert clinical opinion will inform future research on ISA and denial as well as approaches to…
‘Stars’ or ‘professionals’: the imagined vocation and exclusive knowledge of translators in Israel
2010
Amb l’examen de la professionalització suspesa de l’ocupació traductora a Israel, aquest article estudia dos tipus de discursos d’autopresentació i estratègies d’estatus: d’una banda, els dels traductors literaris, i de l’altra, els dels traductors tècnics, subtituladors i traductors literaris que no pertanyen a l’elit. L’anàlisi del primer grup es fonamenta en diversos centenars d’articles retrat i altres reportatges en els mitjans de comunicació, que situen en primer pla 23 traductors reconeguts, mentre que la del segon grup es basa en resultats provisionals d’entrevistes obertes amb 22 treballadors de la traducció no pertanyents a l’elit (seleccionats a partir d’una mostra més àmplia reu…
Validation of the Working Alliance Inventory–Observer Short Version with male intimate partner violence offenders
2018
The working alliance is a key element to increase intimate partner violence (IPV) offenders' motivation, adherence to treatment, and active participation in batterer intervention programs (BIPs). The objective of the present study is to assess the psychometric properties and factor structure of the Working Alliance Inventory-Observer Short Version (WAI-O-S) with a sample of IPV offenders. The sample was 140 men convicted for IPV and court-mandated to a community-based BIP. Inter-rater agreement and reliability were evaluated by computing the intraclass correlation coefficient. To test the latent structure a Bayesian confirmatory factor analysis approach was used. To test criterion-related v…
Denied and false pregnancies: Opposite settings of a single evolutionary conflict
2016
Aim: A woman in denial of pregnancy is pregnant but remains unaware of her gravid state. In the case of a false pregnancy; the woman is not pregnant but believes she is and presents signs and symptoms of pregnancy. These syndromes correspond to opposite contradictions that were mainly explored separately. Our aim is to explain them by a common and consistent etiology. Method: We explore internal conflicts inherited from the evolutionary transition from solitary animals to social species. Results: The solitary and social characters are contradictory. They induce internal conflicts intrinsic to the human condition. At the reproduction level, those conflicts oppose primitive interests (genes t…
Domain Generation Algorithm Detection Using Machine Learning Methods
2018
A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…
Hume on the Phenomenological Discovery of the Self
1993
This paper presents a synthesis of my research into the problem of the self in Hume. The copious bibliography available on this topic indicates that the subject I suggest to discuss is problematic but also of crucial interest. I propose to develop the following argument, namely, that there exists in Hume a psychological awareness of the self. There is no incompatibility between the denial of personal identity in A Treatise of Human Nature Book I, and the arguments put forward in Book II Of the Passions, and in Book III, Of the Understanding of Morals. I shall maintain that Hume is not elaborating an ontological but a psychological theory of the self. This represents a new departure with reg…