12,499 research outputs found

    DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation

    Get PDF
    The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far

    CERT strategy to deal with phishing attacks

    Full text link
    Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain phishing, and why an organization should deal with it and its challenges of providing. In addition, different kinds of this attack and classification of security approaches for organizational and lay users are addressed in this article. Finally, the CERT strategy is presented to deal with phishing and studying some anti-phishing

    Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm

    Get PDF
    Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they perform information fusion which directs immune responses. We have derived a Dendritic Cell Algorithm based on the functionality of these cells, by modelling the biological signals and differentiation pathways to build a control mechanism for an artificial immune system. We present algorithmic details in addition to experimental results, when the algorithm was applied to anomaly detection for the detection of port scans. The results show the Dendritic Cell Algorithm is sucessful at detecting port scans.Comment: 21 pages, 17 figures, Information Fusio

    Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

    Full text link
    The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system. This chapter provides a layered perspective of the smart grid security and discusses game and decision theory as a tool to model the interactions among system components and the interaction between attackers and the system. We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and the challenges of the information security at the management layer of the grid. The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.Comment: 16 page

    The burden of neglected tropical diseases in Ethiopia, and opportunities for integrated control and elimination

    Get PDF
    Background: Neglected tropical diseases (NTDs) are a group of chronic parasitic diseases and related conditions that are the most common diseases among the 2·7 billion people globally living on less than US$2 per day. In response to the growing challenge of NTDs, Ethiopia is preparing to launch a NTD Master Plan. The purpose of this review is to underscore the burden of NTDs in Ethiopia, highlight the state of current interventions, and suggest ways forward. Results: This review indicates that NTDs are significant public health problems in Ethiopia. From the analysis reported here, Ethiopia stands out for having the largest number of NTD cases following Nigeria and the Democratic Republic of Congo. Ethiopia is estimated to have the highest burden of trachoma, podoconiosis and cutaneous leishmaniasis in sub-Saharan Africa (SSA), the second highest burden in terms of ascariasis, leprosy and visceral leishmaniasis, and the third highest burden of hookworm. Infections such as schistosomiasis, trichuriasis, lymphatic filariasis and rabies are also common. A third of Ethiopians are infected with ascariasis, one quarter is infected with trichuriasis and one in eight Ethiopians lives with hookworm or is infected with trachoma. However, despite these high burdens of infection, the control of most NTDs in Ethiopia is in its infancy. In terms of NTD control achievements, Ethiopia reached the leprosy elimination target of 1 case/10,000 population in 1999. No cases of human African trypanosomiasis have been reported since 1984. Guinea worm eradication is in its final phase. The Onchocerciasis Control Program has been making steady progress since 2001. A national blindness survey was conducted in 2006 and the trachoma program has kicked off in some regions. Lymphatic Filariasis, podoconiosis and rabies mapping are underway. Conclusion: Ethiopia bears a significant burden of NTDs compared to other SSA countries. To achieve success in integrated control of NTDs, integrated mapping, rapid scale up of interventions and operational research into co implementation of intervention packages will be crucial

    The therapeutic efficacy and macrofilaricidal activity of doxycycline for the treatment of river blindness

    Get PDF
    Background. Onchocerca volvulus and lymphatic filariae, causing river blindness and elephantiasis, depend on endosymbiotic Wolbachia bacteria for growth, development, fertility, and survival. Clinical trials have shown that doxycycline treatment eliminates Wolbachia, causing long-term sterilization of adult female filariae and effecting potent macrofilaricidal activity. The continual reinfection by drug-naive worms that occurs in these trial settings dilutes observable anti-Wolbachia and antifilarial effects, making it difficult to estimate therapeutic efficacy and compare different doxycycline regimens, evaluated at different times after treatment. Methods. A meta-analytical modeling framework is developed to link all usable data collected from clinical trials measuring the Wolbachia status and viability of individual female adult worms collected at various times after treatment with 4, 5, or 6 weeks of daily 100 or 200 mg oral doxycycline. The framework is used to estimate efficacy parameters that are not directly measurable as trial outcomes. Results. The estimated efficacy of doxycycline (the maximum proportional reduction in the percentage of adult female O. volvulus positive for Wolbachia) is 91%–94% on average, irrespective of the treatment regimen. Efficacy is >95% in the majority of trial participants. The life span of Wolbachia-depleted worms is reduced by 70%–80%, from approximately 10 years to 2–3 years. Conclusions. The efficacy parameters are pertinent to the prospects of using doxycycline on a “test and treat” basis for onchocerciasis control and confirm doxycycline as a potent macrofilaricidal therapy. The modeling approach is more generally relevant to the design and evaluation of clinical trials for antifilarial drugs conducted in endemic settings
    corecore