Search results for "attacks"
showing 10 items of 40 documents
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
Local reactions to tick bites
2008
A retrospective histological and immunohistochemical study has been carried out in 25 cases of tick bites recorded in our Departments. The samples that included an attached tick showed a cement cone anchoring the mouthparts to the skin and a blood-soaked, spongiform appearance of the superficial dermis, with a mild neutrophilic and eosinophilic infiltration. The vessels displayed a loose multilayered endothelial proliferation, with plump endothelia, permeated with erythrocytes. A few of them were severed, allowing copious blood extravasation. The established lesions included the following: erythema chronicum migrans-like cases, foreign body granulomas-sometimes containing remnants of the mo…
Mitigating DDoS using weight‐based geographical clustering
2020
Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …
CNS manifestations of Fabry's disease
2006
Summary Background Fabry's disease is a rare hereditary lysosomal storage disease with multiorgan involvement. Deficiency of α-galactosidase A activity leads to accumulation of neutral glycosphingolipids, especially in vascular endothelial and smooth-muscle cells. Along with progressive renal and cardiac dysfunction, stroke is a major and often life-threatening burden of the disease. Cerebral vasculopathy, confirmed by neuropathological, neuroradiological, and functional studies, occurs commonly and leads to ischaemic cerebrovascular events at an early age. Recent developments Fabry's disease is an X-linked disease and women have been regarded as only mildly affected carriers. However, rese…
Complex Networked Systems: Convergence Analysis, Dynamic Behaviour, and Security.
Complex networked systems are a modern reference framework through which very dierent systems from far disciplines, such as biology, computer science, physics, social science, and engineering, can be described. They arise in the great majority of modern technological applications. Examples of real complex networked systems include embedded systems, biological networks, large-scale systems such as power generation grids, transportation networks, water distribution systems, and social network. In the recent years, scientists and engineers have developed a variety of techniques, approaches, and models to better understand and predict the behaviour of these systems, even though several research…
Dog-bite-related attacks: A new forensic approach
2020
Dog attacks today represent a health hazard considering that prevention strategies have not always been successful. The identification of the dog that attacked the victim is necessary, considering the civil or criminal consequences for the animal's owner. An accurate scene analysis must be performed collecting a series of important information.Forensic investigations in dog attacks involve different methods, such as the evaluating of the canine Short Tandem Repeat (STR) typing in saliva traces on wounds or bite mark analysis, however, these techniques cannot always be applied. The effort to find new methods to identify the dog that attacked the victim represents a very interesting field for…
Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study
2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs). The adopted solution implemented the following security features: open authorization, multi-factor authentication, identity brokering, and user management to safeguard microservice APIs. Then, we extended the security solution with a virtual private network (VPN), Blowfish and crypt (Bcrypt) hash, encryption method, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure. To accomplish and describe the adopted SSK solutio…
Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context
2021
Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…
GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices–A Cybersecurity Pentesting Perspective
2022
As the core part of next-generation air transportation systems, the Automatic Dependent Surveillance-Broadcast (ADS-B) is becoming very popular. However, many (if not most) ADS-B devices and implementations support and rely on Garmin’s GDL-90 protocol for data exchange and encapsulation. In this paper, we research GDL-90 protocol fuzzing options and demonstrate practical Denial-of-Service (DoS) attacks on popular Electronic Flight Bag (EFB) software operating on mobile devices. For this purpose, we specifically configured our own avionics pentesting platform. and targeted the popular Garmin’s GDL-90 protocol as the industry-leading devices operate on it. We captured legitimate traffic from …