482,409 research outputs found

    Analysis of Deep Learning Methods for Wired Ethernet Physical Layer Security of Operational Technology

    Get PDF
    The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at the physical layer or Layer 1 of the OSI model. The security model collects signal data from Ethernet device transmissions, applies deep learning to gather distinguishing features from signal data, and uses these features to make an authentication decision on the Ethernet devices. The proposed approach is passive, automatic, and spoof-resistant. The role of deep learning is critical to the security model. This thesis will look at analyzing and improving deep learning at each step of the security model including data processing, model training, model efficiency, transfer learning on new devices, and device authentication

    Working towards an Improved Monitoring Infrastructure to support Disaster Management, Humanitarian Relief and Civil Security

    Get PDF
    Within this paper experiences and results from the work in the context of the European Initiative on Global Monitoring for Environment and Security (GMES) as they were gathered within the German Remote Sensing Data Center (DFD) are reported. It is described how data flows, analysis methods and information networks can be improved to allow better and faster access to remote sensing data and information in order to support the management of crisis situations. This refers to all phases of a crisis or disaster situation, including preparedness, response and recovery. Above the infrastructure and information flow elements, example cases of different crisis situations in the context of natural disasters, humanitarian relief activities and civil security are discussed. This builds on the experiences gained during the very active participation in the network of Excellence on Global Monitoring for Stability and Security (GMOSS), the GMES Service Element RESPOND, focussing on Humanitarian Relief Support and supporting the International Charter on Space and Major Disasters as well as while linking closely to national, European and international entities related to civil human security. It is suggested to further improve the network of national and regional centres of excellence in this context in order to improve local, regional and global monitoring capacities. Only when optimum interoperability and information flow can be achieved among systems and data providers on one hand side and the decision makers on the other, efficient monitoring and analysis capacities can be established successfully

    SOFTWARE DEFINED CUSTOMIZATION OF NETWORK PROTOCOLS WITH LAYER 4.5

    Get PDF
    The rise of software defined networks, programmable data planes, and host level kernel programmability gives rise to highly specialized enterprise networks. One form of network specialization is protocol customization, which traditionally extends existing protocols with additional features, primarily for security and performance reasons. However, the current methodologies to deploy protocol customizations lack the agility to support rapidly changing customization needs. This dissertation designs and evaluates the first software-defined customization architecture capable of distributing and continuously managing protocol customizations within enterprise or datacenter networks. Our unifying architecture is capable of performing per-process customizations, embedding per-network security controls, and aiding the traversal of customized application flows through otherwise problematic middlebox devices. Through the design and evaluation of the customization architecture, we further our understanding of, and provide robust support for, application transparent protocol customizations. We conclude with the first ever demonstration of active application flow "hot-swapping" of protocol customizations, a capability not currently supported in operational networks.Office of Naval Research, Arlington, VA 22203Lieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    "Paradoxical alchemy" : an examination of the New Zealand Special Operations Forces' relationships in key security networks : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Defence and Security Studies at Massey University, Wellington, New Zealand

    Get PDF
    Drawing on thirty-five interviews with senior military and security personnel, this thesis investigates how the New Zealand Special Operations Forces (NZSOF) maintain their relationships across three key security networks. The three networks are the New Zealand Defence Force (NZDF), the New Zealand National Security Sector (NZNSS), and the Five Special Operations Forces (5SOF). The thesis specifically focuses on how the NZSOF formally and informally engage within these network relationships. The research identifies fifteen common characteristics that the NZSOF exhibit when engaging in these relationships. It then analyses two additional overarching characteristics displayed across these three networks: commonality and utility. Once the characteristics are defined, it then examines how the seventeen relational characteristics feed into the NZSOF's relational dynamics. The thesis finds that, at times, paradoxical relationships can also occur when liminality, ambiguity, and tension manifest in these relational dynamics. The research argues that the NZSOF have two possible approaches to these paradoxes, either to resolve them through changing their relational characteristics, potentially sacrificing their relational dynamism, or they can harness their paradoxical characteristics to support their security relationships, that also potentially comes at a cost. The thesis concludes by exploring the latter option which requires the NZSOF to employ a paradoxical alchemy, to hold the tensions in balance. However, alchemy is not a simple proposition; it is an inherently complex idea that necessitates active management, creativity, and more than a little magic. This will be the future challenge for the NZSOF's contemporary security relationships

    Access Control of Active Networks Based on Decentralized Role Activation Management

    Get PDF
    可编程性使主动网络面临更严重的安全威胁,虽然已经提出了大量的安全策略和安全机制,但它们的实现多以静态为主,无法满足主动网络的动态需求。提出一种基于分散式角色激活管理的访问控制策略,包括身份认证、授权和权限验证,对动态约束提供了灵活有效的支持,比传统的基于角色的访问控制更适应主动网络的动态特性。最后在此基础上设计了主动节点的安全机制。Programmability makes active networks more vulnerable to security threads.Although many security policies and mechanisms are provided, most of them are implemented in static ways and can not meet the dynamic requirement of active networks.Proposes a decentralized role activation in RABC for active networks,which includes authentication,authorization and permission verification.The mechanism provides a flexible way to support dynamic constraints and is more suitable for the dynamic characteristic of active networks than the traditional RABC.Based on this work,a security mechanism of active node is brought forward in the end.福建省2004年自然科学基金(A0410004);; 厦门大学院士基金资助(0630-E23011);; 厦门大学新世纪优秀人才支持基金(0000-X07116);; 广东省自然科学基金(06029667);; 中山市科技项目(2006A157

    An exploratory study of informal support and life satisfaction of older persons in Macau

    Full text link
    The purpose of the research is to explore the forms of support provided by informal support networks of spouse, adult children, relatives, friends and neighbours for older persons in Macau. The research also attempts to identify the elements that contribute to life satisfaction among active older persons. As little research has been conducted in Macau, this study tries to introduce data and possible suggestions for initiatives in elderly policy in this area. The thesis adopts mainly a qualitative approach in exploring the possible informal support elements that contribute to life satisfaction as perceived by active older persons. Sixty-five in depth interviews with 40 female and 25 male older persons aged from 65 to 90 invited as respondents, all of whom were active and of good health status, were conducted either in old age centers or older persons’ apartments from late July to Mid October in Macau. Triangulation of various sources, the sources of data was employed to cross-check the validity of the initial explanations derived included two focus group discussions, key informant interviews, a review of the published literature, independent member checking as well as content analysis with correlation analysis. Content analysis using open and axial coding identified four major types of support: tangible support, informational support, companionship support and emotional support. The research revealed that children and a spouse mainly provided emotional and tangible support. Companionship support was mainly provided by friends. Information support came the last, and was only important when it comes to crucial issues such as going to hospital, or when wishing to apply for specific services. In terms of the sources of informal support, the findings indicated that adult children are regarded as the primary reliable persons who provided various forms of support for their older parents. This care and support was regarded as obligatory in nature. The second primary support source was spousal. Spouses provided personal daily care for each other. Friends mainly provided companionship support and the support is voluntary in nature. Perhaps unexpectedly, the research found that relatives provided the least frequent support due to distance and sometimes relationships were poor. With respect to the relationship between informal support and life satisfaction, the results obtained by a series of correlation analysis reviewed that being concerned and cared for, respected, providing money for daily necessities, meetings and decisions-making by children are important for older persons and are statistically significant to life satisfaction. The support provided by children can create a sense of security and well being associated with life satisfaction. The mutual care by a spouse creates a sense of security and in turn enhances life satisfaction. Friends provided companionship support in terms of chatting, and participating in social activities, which enrich life quality and contribute to life satisfaction. It is notable that relatives’ support did not contribute very much to life satisfaction. This research suggests the value of strengthening community care services by providing old age allowance, promoting intergeneration education and encouraging older persons to be active in participating in social activities. These can enhance the well being of older persons in Macau. Social policy for older persons should potentially aim at achieving this end

    Economic Intelligence: An Operational Concept for a Globalised World

    Get PDF
    Economic security policies consist in the prevention and avoidance of all situations that can disrupt the life of either companies or States. In France, economic security is seen through the prism of ‘economic intelligence’, which aims to encompass all aspects of globalised risks and opportunities. State security policies are widening their scope far beyond the military aspect, while more and more companies include security concerns in their strategies and management. In broad terms, economic security policies consist in the prevention and avoidance of all situations that can disrupt the life of companies or States and their success depends on their ability to anticipate, imagine new schemes, adapt norms and structures to the changes and to build networks of competences and co-operation, particularly between the public and private sectors but also between States sharing the same general interests. Economic security and economic intelligence must not be understood as purely defensive, as a withdrawal into one’s shell, but as the first step for building active policies and alliances, the latter being a pre-requisite to act and seize opportunities in our globalised world. This ARI is based on the author’s contribution to the Panel on Economic Security at the seminar organised by the Elcano Royal Institute on 28 June 2010 to support the preparation of Spain’s Spanish Security Strategy. At the seminar she gave an account of France’s approach to economic security and economic intelligence

    Submission to the Attorney-General’s Department on the Exposure Draft Telecommunications and Other Legislation Amendment Bill 2015

    Get PDF
    EXECUTIVE SUMMARY As has been stated in previous submissions to Government, the Associations acknowledge Government’s desire to protect telecommunications infrastructure and the information transmitted across it from unauthorised access and interference. Indeed, Australian Carriers, Carriage Service Providers and Carriage Service Intermediaries (C/CSPs) and other industry participants have an active and vested interest in ensuring that the nation’s networks and communications infrastructure are robust and resistant to external attack. Industry is, however, unable to support the proposed Telecommunications Sector Security Reform (TSSR), as described in the exposure draft legislation, for reasons including that it constitutes regulatory ‘over-reach’ in the form of a framework that: will face challenges protecting communications networks, i.e. it will not deliver the increased protection the proposed reforms are aiming to achieve; is out of step with regulatory approaches to protecting networks adopted in other countries, including the UK, USA and Canada, thereby putting Australia at a disadvantage in fighting cyber threats and undermine Industry’s ability to support these important peers; hands unjustifiably significant additional and intrusive powers to Government and places regulatory burdens on Industry that will undermine its ability to protect against and respond to cyber attacks; risks being highly disruptive to the deployment of new network technologies that are more robust in preventing cyber attacks; will be a significant deterrent to technological investment in Australia; imposes additional costs on Industry and (ultimately) consumers undermining Australia’s competitiveness at a time when digital innovation is an important area for growth for Australia; fails to offer protection/indemnity to C/CSPs against the risk of civil litigation through ‘safe harbours’, thereby limiting information sharing and the ability to quickly respond to threats and to jointly engage in preventative action; carries the risk that competition in infrastructure supply will be reduced, to the detriment of all Australians; lacks transparency; and fails to provide adequate consultative mechanisms and avenues of appeal

    A WINDOWS-BASED ACTIVE-ROUTER ARCHITECTURE

    Get PDF
    As computing power becomes cheaper, more and more functionality is being deployed inside computer networks, to provide better services to users. Examples of such services include support for Quality-of-Service (QoS), multicast, mobility and security. Nevertheless, such functionalities are still lacking in most networking systems. Active networking is a step towards enhancing the static and inflexible structures of current networks. This paper focuses on the design and development of technologies that allow rapid deployment of functionality throughout the network. The paper presents the design and implementation of a Windows-Based Active Router (WBAR) architecture, which provides flexibility for the development of future network services. The hardware is based on a personal computer with 2GHz, Intel P4 processor. The designed AR depends on the use of Windows OS and efficient C programming. Windows OS is rarely used in such projects due to complexity of kernel-mode programming

    Security Protocol for Active Networks.

    Get PDF
    corecore