31,514 research outputs found

    The ionosphere prediction service prototype for GNSS users

    Get PDF
    The effect of the Earth’s ionosphere represents the single largest contribution to the Global Navigation Satellite System (GNSS) error budget and abnormal ionospheric conditions can impose serious degradation on GNSS system functionality, including integrity, accuracy and availability. With the growing reliance on GNSS for many modern life applications, actionable ionospheric forecasts can contribute to the understanding and mitigation of the impact of the ionosphere on our technology based society. In this context, the Ionosphere Prediction Service (IPS) project was set up to design and develop a prototype platform to translate the forecast of the ionospheric effects into a service customized for specific GNSS user communities. To achieve this overarching aim, four different product groups dealing with solar activity, ionospheric activity, GNSS receiver performance and service performance have been developed and integrated into a service chain, which is made available through a web based platform. This paper provides an overview of the IPS project describing its overall architecture, products and web based platform.PublishedA412A. Fisica dell'alta atmosferaJCR Journa

    Comparison of Intrusion Detection Systems/Intrusion Prevention Systems – A Selection Criterion

    Get PDF
    Most of the devices and systems nowadays are complex connected devices that perform critical functions. Security in these devices is a critical task and of the highest importance. The protection of the data is mandatory for any organization, so there is a demand for the security mechanism to protect the data. Security is a challenging issue that should be taken into consideration when designing and building business-based web applications, as well as during its maintenance stage. Security can be provided to a system in various ways at different layers. This can be done either by an Intrusion Prevent System (IPS) or Intrusion Detection Systems (IDS). Usually deployed in a network to monitor the traffic, these systems use their own methodology to prevent, mitigate, and arrive at conclusions. The main objective of the paper is to discuss various kinds of IPS/IDS in detail, and their uniqueness which makes them stand out for various reasons. An additional discussion point will indicate which IDS/IPS can be used according to the security requirement, their functionality, and performances with their effectiveness to stop the malicious activity over a computer network. Reasons to choose a specific IDS/IPS will be listed. One of the high-level objectives of the paper is to create awareness about the availability of IDS/IPS and information on which one to choose for their requirements

    Compromising Tor Anonymity Exploiting P2P Information Leakage

    Get PDF
    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP
    • …
    corecore