9,663 research outputs found

    A quick-response real-time stepping stone detection scheme

    Full text link
    Stepping stone attacks are often used by network intruders to hide their identities. To detect and block stepping stone attacks, a stepping stone detection scheme should be able to correctly identify a stepping-stone in a very short time and in real-time. However, the majority of past research has failed to indicate how long or how many packets it takes for the monitor to detect a stepping stone. In this paper, we propose a novel quick-response real-time stepping stones detection scheme which is based on packet delay properties. Our experiments show that it can identify a stepping stone within 20 seconds which includes false positives and false negatives of less than 3%

    Index to NASA Tech Briefs, 1975

    Get PDF
    This index contains abstracts and four indexes--subject, personal author, originating Center, and Tech Brief number--for 1975 Tech Briefs

    On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

    Full text link
    Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community. Due to recently published proof-of-concept attacks, the topic is becoming ever more pressing, especially with the deadline for mandatory implementation in most airspaces fast approaching. This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security. Thereafter, it surveys both the theoretical and practical efforts which have been previously conducted concerning these issues, including possible countermeasures. In addition, the survey seeks to go beyond the current state of the art and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.Comment: Survey, 22 Pages, 21 Figure

    Detecting backdoor using stepping stone detection approach

    Get PDF
    Several techniques are used by intruders to hide the track of intrusion in the network.One of these techniques executes by using series of hosts in network (stepping stones chain), which can be detected by using an approach, called Stepping Stone Detection (SSD). However, during all previous years, SSD was only confined to detect this type of intrusion.This paper discusses the using of SSD approach and potential applications in other emerging field by introduce the using of SSD concepts in backdoor attack detection field.This research shows that by using SSD to detect backdoor attack can be gained very low false negative and false positive rates and reduces the scan process time detection

    An Exploratory Approach to Manipulating Dynamic Stability: Investigating the Role of Visual Control during a Precision Foot Placement Task

    Get PDF
    ABSTRACT Background: The visual system provides the body with an accurate sensory system; designed to gather information at a distance and acts as a feedforward control mechanism during human locomotion. By doing so, visual information contributes coordination of the head-arm-trunk (HAT) segment and modulating foot placement. The purpose of this study was to examine the effects of a constrained pathway during a complex navigational stone-stepping task on HAT segment control and how the visual system guides locomotion during a complex foot placement task. Methods: Nine university-aged females (Mean age: 22.5 years old +/-1.75) participated in this study. Participants were instrumented with four rigid bodies (4x3 IRED markers) on the head, trunk and feet and two IRED markers on the wrists in order to measure kinematic data, collected by Optotrak system (NDI, Waterloo, Canada). Additionally, each participant was outfitted with an ASL H7-HS High Speed Head Mounted Optics (ASL, Bedford, USA) eye tracking unit to assess gaze behaviours. The experimental protocol required participants to perform 40 walking trials across four conditions (i.e., constrained and self-selected pathways; starting with either the left or the right foot), on a 7.2m x 1.2m raised-target platform. The platform consisted of 60 sloper-style rock climbing holds, whose location was designed to satisfy one of three criterion: 1) in line with natural footfall locations (e.g. normal step length and/or width dimensions of 60cm by 10cm); 2) greater or less than one of the dimensions of a natural step length or width; or 3) to act as a possible option/distractor on the pathway. The two constrained pathways were indicated with a high-contrasting moldable material placed inside each hold’s screw hole. Measurements were compared across conditions (i.e., constrained versus unconstrained), time points (e.g. first, middle, and last trial performed of each condition), and segment (Segment 1: first 3m of path or Segment 2: last 3m of path). The measurements included: horizontal and vertical pupil velocity RMS; average walking speed; trunk rotations about the hip (i.e., pitch and roll), and whole-body movement (i.e., ML COM variability). Results: Findings revealed that there was a significant difference between conditions such that: 1) the constrained vertical pupil RMS velocity was higher than the unconstrained (F(3,24)=4.71; p= .04; d=.46); 2) the unconstrained horizontal pupil RMS velocity was higher than the unconstrained (F(3,24)=4.40; p= .03; d=.36); 3) the constrained average walking speed was greater than the unconstrained (F(3,24)=23.27; p=0.04; d=.30); 4) the constrained trunk roll was greater than the unconstrained (F(3,21)=4.84; p=0.01; d=.45); and 5) the unconstrained dynamic stability margin minimum (DSMmin) was greater than the constrained (F(3,21)=4.89; p= .01; d=.41). Conclusions: The complex nature of the raised-target foot placement task challenged individuals from the start of each condition, forcing participants to learn how to control body movements—especially in the AP direction. During constrained condition, there was evidence to suggest that there was a greater regulation of trunk control than during unconstrained trials. This was attributed to the conditional demands of predetermined pathway to follow. However, during unconstrained trials, individuals were able to choose footholds, which were most likely based on their current state of stability. And thus, conditional demands of the pathway influenced gaze behaviours, such that during the constrained condition participants used a scanning behaviour (i.e., greater vertical pupil velocity RMS) whereas participants used more of a sampling behaviour (i.e., greater horizontal and slower vertical pupil velocities) during the free choice pathway condition. Therefore, the finding from this study suggest that gaze behaviours are influenced by stepping characteristics and these different gaze behaviours have different effects on trunk control

    Wide spectrum attribution: Using deception for attribution intelligence in cyber attacks

    Get PDF
    Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click crimeware kits are widely circulated in the underground economy, while source code for sophisticated malware such as Stuxnet is available for all to download and repurpose. Despite decades of research into defensive techniques, such as firewalls, intrusion detection systems, anti-virus, code auditing, etc, the quantity of successful cyber attacks continues to increase, as does the number of vulnerabilities identified. Measures to identify perpetrators, known as attribution, have existed for as long as there have been cyber attacks. The most actively researched technical attribution techniques involve the marking and logging of network packets. These techniques are performed by network devices along the packet journey, which most often requires modification of existing router hardware and/or software, or the inclusion of additional devices. These modifications require wide-scale infrastructure changes that are not only complex and costly, but invoke legal, ethical and governance issues. The usefulness of these techniques is also often questioned, as attack actors use multiple stepping stones, often innocent systems that have been compromised, to mask the true source. As such, this thesis identifies that no publicly known previous work has been deployed on a wide-scale basis in the Internet infrastructure. This research investigates the use of an often overlooked tool for attribution: cyber de- ception. The main contribution of this work is a significant advancement in the field of deception and honeypots as technical attribution techniques. Specifically, the design and implementation of two novel honeypot approaches; i) Deception Inside Credential Engine (DICE), that uses policy and honeytokens to identify adversaries returning from different origins and ii) Adaptive Honeynet Framework (AHFW), an introspection and adaptive honeynet framework that uses actor-dependent triggers to modify the honeynet envi- ronment, to engage the adversary, increasing the quantity and diversity of interactions. The two approaches are based on a systematic review of the technical attribution litera- ture that was used to derive a set of requirements for honeypots as technical attribution techniques. Both approaches lead the way for further research in this field

    An Exploratory Approach to Manipulating Dynamic Stability: Investigating the Role of Visual Control during a Precision Foot Placement Task

    Get PDF
    ABSTRACT Background: The visual system provides the body with an accurate sensory system; designed to gather information at a distance and acts as a feedforward control mechanism during human locomotion. By doing so, visual information contributes coordination of the head-arm-trunk (HAT) segment and modulating foot placement. The purpose of this study was to examine the effects of a constrained pathway during a complex navigational stone-stepping task on HAT segment control and how the visual system guides locomotion during a complex foot placement task. Methods: Nine university-aged females (Mean age: 22.5 years old +/-1.75) participated in this study. Participants were instrumented with four rigid bodies (4x3 IRED markers) on the head, trunk and feet and two IRED markers on the wrists in order to measure kinematic data, collected by Optotrak system (NDI, Waterloo, Canada). Additionally, each participant was outfitted with an ASL H7-HS High Speed Head Mounted Optics (ASL, Bedford, USA) eye tracking unit to assess gaze behaviours. The experimental protocol required participants to perform 40 walking trials across four conditions (i.e., constrained and self-selected pathways; starting with either the left or the right foot), on a 7.2m x 1.2m raised-target platform. The platform consisted of 60 sloper-style rock climbing holds, whose location was designed to satisfy one of three criterion: 1) in line with natural footfall locations (e.g. normal step length and/or width dimensions of 60cm by 10cm); 2) greater or less than one of the dimensions of a natural step length or width; or 3) to act as a possible option/distractor on the pathway. The two constrained pathways were indicated with a high-contrasting moldable material placed inside each hold’s screw hole. Measurements were compared across conditions (i.e., constrained versus unconstrained), time points (e.g. first, middle, and last trial performed of each condition), and segment (Segment 1: first 3m of path or Segment 2: last 3m of path). The measurements included: horizontal and vertical pupil velocity RMS; average walking speed; trunk rotations about the hip (i.e., pitch and roll), and whole-body movement (i.e., ML COM variability). Results: Findings revealed that there was a significant difference between conditions such that: 1) the constrained vertical pupil RMS velocity was higher than the unconstrained (F(3,24)=4.71; p= .04; d=.46); 2) the unconstrained horizontal pupil RMS velocity was higher than the unconstrained (F(3,24)=4.40; p= .03; d=.36); 3) the constrained average walking speed was greater than the unconstrained (F(3,24)=23.27; p=0.04; d=.30); 4) the constrained trunk roll was greater than the unconstrained (F(3,21)=4.84; p=0.01; d=.45); and 5) the unconstrained dynamic stability margin minimum (DSMmin) was greater than the constrained (F(3,21)=4.89; p= .01; d=.41). Conclusions: The complex nature of the raised-target foot placement task challenged individuals from the start of each condition, forcing participants to learn how to control body movements—especially in the AP direction. During constrained condition, there was evidence to suggest that there was a greater regulation of trunk control than during unconstrained trials. This was attributed to the conditional demands of predetermined pathway to follow. However, during unconstrained trials, individuals were able to choose footholds, which were most likely based on their current state of stability. And thus, conditional demands of the pathway influenced gaze behaviours, such that during the constrained condition participants used a scanning behaviour (i.e., greater vertical pupil velocity RMS) whereas participants used more of a sampling behaviour (i.e., greater horizontal and slower vertical pupil velocities) during the free choice pathway condition. Therefore, the finding from this study suggest that gaze behaviours are influenced by stepping characteristics and these different gaze behaviours have different effects on trunk control

    05381 Abstracts Collection -- Form and Content in Sensor Networks

    Get PDF
    From 18.09.05 to 23.09.05, the Dagstuhl Seminar 05381 ``Form and Content in Sensor Networks\u27\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar as well as abstracts of seminar results and ideas are put together in this paper. The first section describes the seminar topics and goals in general. Links to extended abstracts or full papers are provided, if available
    • …
    corecore