Search results for "attack"
showing 10 items of 221 documents
Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme
2017
Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…
SDN controllers security issues
2017
Software-Defined Networking (SDN) is essentially varying the way we design and manage networks, which makes a communication network programmable. In SDN, a logically centralized controller has straight control over the packet-handling functions of the network switches, using a standard, open API (Application Programming Interface) such as OpenFlow. OpenFlow is a broadly used protocol for software-defined networks (SDNs) that presents a new model in which the control plane is inattentive from the forwarding plane for the network devices. In SDN approach centralized entities called "controllers" perform like network operating systems run dissimilar applications that accomplish and control the…
The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies
2013
Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…
Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
2022
Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing industrial control system (ICS) traffic data plays a central role in detecting and defending against cyber-attacks. Detection approaches based on system modeling require effectively modeling the complex behavior of the critical infrastructures, which remains a challenge, especially for large-scale systems. Alternatively, data-driven approaches which rely on data collected from the inspected system have become appealing due to the availability of big data that supports machine learning methods to achieve outstanding performance. This chapter presents an enhanced cyber-attack detection strategy using unlabeled…
MODERN VOLLEYBALL ANALYSIS AND TRAINING PERIODIZATION
2018
The purpose of this study is to clarify the scientific approach to modern volleyball at men´s high-level and introduce the most influential studies, which still are not very well implemented in the world of volleyball. On individual level, requirements of modern volleyball consist psychological aspects like inner motivational and maintaining the focus during the game, which is difficult because there are a lot of breaks and successful and unsuccessful rallies in every volleyball match. Inner motivated player can push himself easier to the limits of his capacity during the game. Good focus and team routines keep the difference between won and lost rally small so that the player and the team …
Adversarial Machine Learning in e-Health: Attacking a Smart Prescription System
2022
Machine learning (ML) algorithms are the basis of many services we rely on in our everyday life. For this reason, a new research line has recently emerged with the aim of investigating how ML can be misled by adversarial examples. In this paper we address an e-health scenario in which an automatic system for prescriptions can be deceived by inputs forged to subvert the model's prediction. In particular, we present an algorithm capable of generating a precise sequence of moves that the adversary has to take in order to elude the automatic prescription service. Experimental analyses performed on a real dataset of patients' clinical records show that a minimal alteration of the clinical record…
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
Gastrooesophageal reflux and "Epileptic" attacks: casually associated or related? Efficiency of antireflux surgery, a case report
2012
P02.30 GASTRO-OESOPHAGEAL REFLUX AND “EPILEPTIC” ATTACKS: CASUALLY ASSOCIATED OR RELATED? EFFICIENCY OF ANTIREFLUX SURGERY A CASE REPORT Achille Mastrosimone1, Alessia Cusimano2, Silvia Marino2, Gianni Pantuso2, Eugenio Fiorentino2 1Policlinico Of Palermo, Palermo/ITALY, 2University Of Palermo, Palermo/ITALY Background: Although a possible link between gastro-oesophageal reflux disease (GORD) and obstructive sleeping apnoea has already been reported in the literature, there has never been any suggestion of an association with epilepsy, and epileptic attacks have not so far been included among gastro- oesophageal reflux disease symptoms. Methods: We report the case of a patient with gastro-o…
Honeypot Utilization for Network Intrusion Detection
2018
For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…
Evaluation of the Possible Impact of Care Network for Stroke and Transient Ischemic Attack on Rates of Recurrence
2011
International audience