Search results for "attack"
showing 10 items of 221 documents
An analytical model of a new packet marking algorithm for TCP flows
2005
In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…
Scenekunstens (for)handlingsrom etter 22. juli
2019
In this article I discuss theatre’s scope of action after the 2011 terror attacks in Norway (“22. July”), with an emphasis on independent theatre, aesthetic heteronomy and the public sphere. A theatre manager’s (Jon Refsdal Moe) retrospect account of and reflections upon a case of self-censoring is the starting point for my (re-)examination of the arguments and dynamics concerning some of the most prominent contentious 22. July performances. I discuss how the controversies can be understood and dealt with, and how they are connected to theatre’s scope of action and place in society today. In my argument, I differentiate between the public sphere as an arena for discussion and debate (which …
Riflessioni comparatistiche sulla revoca della cittadinanza per reati di terrorismo
2023
l fenomeno dei cosiddetti “foreign fighters” e il verificarsi di attacchi terroristici in alcuni paesi dell’Unione europea hanno sollevato la questione relativa alla privazione della cittadinanza come misura di contrasto e tutela della sicurezza pubblica. Questo articolo intende contribuire al dibattito sulla legittimità giuridica di tale misura, esaminando i recenti sviluppi della legislazione in materia e le sue applicazioni in Belgio, Francia, Regno Unito e Italia.
On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks
2015
This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …
Caspase-3 contributes to ZO-1 and Cl-5 tight-junction disruption in rapid anoxic neurovascular unit damage.
2011
BACKGROUND: Tight-junction (TJ) protein degradation is a decisive step in hypoxic blood-brain barrier (BBB) breakdown in stroke. In this study we elucidated the impact of acute cerebral ischemia on TJ protein arrangement and the role of the apoptotic effector protease caspase-3 in this context. METHODOLOGY/PRINCIPAL FINDINGS: We used an in vitro model of the neurovascular unit and the guinea pig whole brain preparation to analyze with immunohistochemical methods the BBB properties and neurovascular integrity. In both methodological approaches we observed rapid TJ protein disruptions after 30 min of oxygen and glucose deprivation or middle cerebral artery occlusion, which were accompanied by…
The emotional timeline of September 11, 2001.
2010
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…
On the pathogenesis of atherosclerosis: enzymatic transformation of human low density lipoprotein to an atherogenic moiety.
1995
Combined treatment with trypsin, cholesterol esterase, and neuraminidase transforms LDL, but not HDL or VLDL, to particles with properties akin to those of lipid extracted from atherosclerotic lesions. Single or double enzyme modifications, or treatment with phospholipase C, or simple vortexing are ineffective. Triple enzyme treatment disrupts the ordered and uniform structure of LDL particles, and gives rise to the formation of inhomogeneous lipid droplets 10-200 nm in diameter with a pronounced net negative charge, but lacking significant amounts of oxidized lipid. Enzymatically modified LDL (E-LDL), but not oxidatively modified LDL (ox-LDL), is endowed with potent complement-activating c…
Data Stream Clustering for Application-Layer DDoS Detection in Encrypted Traffic
2018
Application-layer distributed denial-of-service attacks have become a serious threat to modern high-speed computer networks and systems. Unlike network-layer attacks, application-layer attacks can be performed using legitimate requests from legitimately connected network machines that make these attacks undetectable by signature-based intrusion detection systems. Moreover, the attacks may utilize protocols that encrypt the data of network connections in the application layer, making it even harder to detect an attacker’s activity without decrypting users’ network traffic, and therefore violating their privacy. In this paper, we present a method that allows us to detect various application-l…
Biometric sensors rapid prototyping on field-programmable gate arrays
2015
AbstractBiometric user authentication in large-scale distributed systems involves passive scanners and networked workstations and databases for user data acquisition, processing, and encryption. Unfortunately, traditional biometric authentication systems are prone to several attacks, such as Replay Attacks, Communication Attacks, and Database Attacks. Embedded biometric sensors overcome security limits of conventional software recognition systems, hiding its common attack points. The availability of mature reconfigurable hardware technology, such as field-programmable gate arrays, allows the developers to design and prototype the whole embedded biometric sensors. In this work, two strong an…