12,499 research outputs found
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity
people and get access to their personal information. Phishing is a somehow
complex method that has recently been considered by internet thieves.The
present study aims to explain phishing, and why an organization should deal
with it and its challenges of providing. In addition, different kinds of this
attack and classification of security approaches for organizational and lay
users are addressed in this article. Finally, the CERT strategy is presented to
deal with phishing and studying some anti-phishing
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link
between the innate and adaptive immune system, providing the initial detection
of pathogenic invaders. Research into this family of cells has revealed that
they perform information fusion which directs immune responses. We have derived
a Dendritic Cell Algorithm based on the functionality of these cells, by
modelling the biological signals and differentiation pathways to build a
control mechanism for an artificial immune system. We present algorithmic
details in addition to experimental results, when the algorithm was applied to
anomaly detection for the detection of port scans. The results show the
Dendritic Cell Algorithm is sucessful at detecting port scans.Comment: 21 pages, 17 figures, Information Fusio
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
The smart grid is a large-scale complex system that integrates communication
technologies with the physical layer operation of the energy systems. Security
and resilience mechanisms by design are important to provide guarantee
operations for the system. This chapter provides a layered perspective of the
smart grid security and discusses game and decision theory as a tool to model
the interactions among system components and the interaction between attackers
and the system. We discuss game-theoretic applications and challenges in the
design of cross-layer robust and resilient controller, secure network routing
protocol at the data communication and networking layers, and the challenges of
the information security at the management layer of the grid. The chapter will
discuss the future directions of using game-theoretic tools in addressing
multi-layer security issues in the smart grid.Comment: 16 page
The burden of neglected tropical diseases in Ethiopia, and opportunities for integrated control and elimination
Background:
Neglected tropical diseases (NTDs) are a group of chronic parasitic diseases and related conditions that are the most common diseases among the 2·7 billion people globally living on less than US$2 per day. In response to the growing challenge of NTDs, Ethiopia is preparing to launch a NTD Master Plan. The purpose of this review is to underscore the burden of NTDs in Ethiopia, highlight the state of current interventions, and suggest ways forward.
Results:
This review indicates that NTDs are significant public health problems in Ethiopia. From the analysis reported here, Ethiopia stands out for having the largest number of NTD cases following Nigeria and the Democratic Republic of Congo. Ethiopia is estimated to have the highest burden of trachoma, podoconiosis and cutaneous leishmaniasis in sub-Saharan Africa (SSA), the second highest burden in terms of ascariasis, leprosy and visceral leishmaniasis, and the third highest burden of hookworm. Infections such as schistosomiasis, trichuriasis, lymphatic filariasis and rabies are also common. A third of Ethiopians are infected with ascariasis, one quarter is infected with trichuriasis and one in eight Ethiopians lives with hookworm or is infected with trachoma. However, despite these high burdens of infection, the control of most NTDs in Ethiopia is in its infancy. In terms of NTD control achievements, Ethiopia reached the leprosy elimination target of 1 case/10,000 population in 1999. No cases of human African trypanosomiasis have been reported since 1984. Guinea worm eradication is in its final phase. The Onchocerciasis Control Program has been making steady progress since 2001. A national blindness survey was conducted in 2006 and the trachoma program has kicked off in some regions. Lymphatic Filariasis, podoconiosis and rabies mapping are underway.
Conclusion:
Ethiopia bears a significant burden of NTDs compared to other SSA countries. To achieve success in integrated control of NTDs, integrated mapping, rapid scale up of interventions and operational research into co implementation of intervention packages will be crucial
The therapeutic efficacy and macrofilaricidal activity of doxycycline for the treatment of river blindness
Background.
Onchocerca volvulus and lymphatic filariae, causing river blindness and elephantiasis, depend on endosymbiotic Wolbachia bacteria for growth, development, fertility, and survival. Clinical trials have shown that doxycycline treatment eliminates Wolbachia, causing long-term sterilization of adult female filariae and effecting potent macrofilaricidal activity. The continual reinfection by drug-naive worms that occurs in these trial settings dilutes observable anti-Wolbachia and antifilarial effects, making it difficult to estimate therapeutic efficacy and compare different doxycycline regimens, evaluated at different times after treatment.
Methods.
A meta-analytical modeling framework is developed to link all usable data collected from clinical trials measuring the Wolbachia status and viability of individual female adult worms collected at various times after treatment with 4, 5, or 6 weeks of daily 100 or 200 mg oral doxycycline. The framework is used to estimate efficacy parameters that are not directly measurable as trial outcomes.
Results.
The estimated efficacy of doxycycline (the maximum proportional reduction in the percentage of adult female O. volvulus positive for Wolbachia) is 91%–94% on average, irrespective of the treatment regimen. Efficacy is >95% in the majority of trial participants. The life span of Wolbachia-depleted worms is reduced by 70%–80%, from approximately 10 years to 2–3 years.
Conclusions.
The efficacy parameters are pertinent to the prospects of using doxycycline on a “test and treat” basis for onchocerciasis control and confirm doxycycline as a potent macrofilaricidal therapy. The modeling approach is more generally relevant to the design and evaluation of clinical trials for antifilarial drugs conducted in endemic settings
- …