Search results for "attack"
showing 10 items of 221 documents
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
2017
With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…
New client puzzle approach for DoS resistance in ad hoc Networks
2010
In this paper we propose a new client puzzle approach to prevent Denial of Service (DoS) attacks in ad hoc networks. Each node in the network first solves a computational problem and with the solution has to create and solve a client puzzle. By combining computational problems with puzzles, we improve the efficiency and latency of the communicating nodes and resistance in DoS attacks. Experimental results show the effectiveness of our approach.
Five-to-Six Membered Ring-rearrangements in the Reaction of 5-Perfluoroalkyl-1,2,4-oxadiazoles with Hydrazine and Methylhydrazine
2006
The hydrazinolysis reaction of 5-perfluoroalkyl-1,2,4-oxadiazoles with hydrazine or methylhydrazine as bidentate nucleophiles has been investigated. The reaction occurred through the addition of the bidentate nucleophile to the C(5)-N(4) double bond of the 1,2,4-oxadiazole followed by ring-opening and ring-closure (ANRORC) involving the second nucleophilic site of the reagent. This ring-closure step could involve either the original C(3) of the 1,2,4-oxadiazole (giving a five-to-five membered ring rearrangement) or an additional electrophilic center linked to it (exploiting a five-to-six membered ring rearrangement). An alternative initial nucleophilic attack may involve the additional elec…
On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Missio…
2022
Automatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, an…
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
2020
Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…
Reduced Admissions for Cerebrovascular Events during COVID-19 Outbreak in Italy
2020
Supplemental Digital Content is available in the text.
O início de uma nova era: teste sistemático para patógenos causadores de infecções agudas das vias aéreas superiores (IVAS) em crianças
2007
On average humans get sick ten times per year. About six times the illness is due to an acute respiratory tract infection (ARI). Morbidity is especially high in children since they usually encounter the offending organism for the first time in their life; the lack of immunity results in shedding of the offending organisms in high numbers of prolonged time as compared to adults; their airways are smaller than those of adults and thus the inflammatory response leads to a more significant narrowing of the airways resulting in more severe disease; on average they have a high number of social contacts and also a more intimate contact with peers and caregivers alike resulting in a higher attack r…
Drones in cyber security environment
2019
Aerial unmanned vehicles (AUV) are currently used for a wide range of operations such as border surveillance, surveillance, reconnaissance, transport, aerial photography, traffic control, earth observation, communications, broadcasting and armed attacks. AUVs are presumed to be reliable, automated and autonomous machines. AUVs are extremely suitable for long missions that strain flight crews or put them to harm's way. Two advantages can be gained by eliminating the flight crew: 1) performance improves (range, endurance, increased payload and maneuverability, smaller physical size and lower observability) and; 2) the ability to take higher risks. UAV/RPAS/drone cyber security has largely foc…
Propagation of Bankruptcy Risk over Scale-Free Economic Networks.
2022
The propagation of bankruptcy-induced shocks across domestic and global economies is sometimes very dramatic; this phenomenon can be modelled as a dynamical process in economic networks. Economic networks are usually scale-free, and scale-free networks are known to be vulnerable with respect to targeted attacks, i.e., attacks directed towards the biggest nodes of the network. Here we address the following question: to what extent does the scale-free nature of economic networks and the vulnerability of the biggest nodes affect the propagation of economic shocks? We model the dynamics of bankruptcies as the propagation of financial contagion across the banking sector over a scale-free network…
Emerging Economies Faced With The Downside Of Financial Globalization: Hedges And Way Outs
2009
The underlining assumption of this paper is that developing countries are in a fragile state nowadays. Economically, they have been seriously harmed by the 2008 crisis1 but this is not the end of the story: the future still has pitfalls in which these economies might get trapped, due to their enhanced vulnerability to exogenous shocks generated by financial globalization. Ideologically, the recent events have triggered a serious backlash against capitalism, particularly the Anglo-Saxon template. Getting an insight into the causes and implications of global economic crises is therefore critical for policy-makers in emerging economies. History might be a good adviser in this respect. Lessons …