2,665 research outputs found

    Active Response Using Host-Based Intrusion Detection System and Software-Defined Networking

    Get PDF
    This research proposes AHNSR: Active Host-based Network Security Response by utilizing Host-based Intrusion Detection Systems (HIDS) with Software-Defined Networking (SDN) to enhance system security by allowing dynamic active response and reconstruction from a global network topology perspective. Responses include traffic redirection, host quarantining, filtering, and more. A testable SDN-controlled network is constructed with multiple hosts, OpenFlow enabled switches, and a Floodlight controller, all linked to a custom, novel interface for the Open-Source SECurity (OSSEC) HIDS framework. OSSEC is implemented in a server-agent architecture, allowing scalability and OS independence. System effectiveness is evaluated against the following factors: alert density and a selective Floodlight module response types. At the expected operational load of 500 events per second (EPS), results reveal a mean system response time of 0.5564 seconds from log generation to flow table update via Floodlights Access Control List module. Load testing further assesses performance at 10 - 10000 EPS for all tested response modules

    Durabilty of 25 Local Specific Wood Species From Java Preserved with Ccb Against Marine Borers Attack

    Full text link
    This study was conducted to provide basis information of the 25 local specific wood species indigenous from Java treated by copper bichromated boron (CCB). The full-cell process for 2 hours and 150 psi during the pressure-keeping period was employed. The IUFRO method was applied for the determination of wood treatability class. The treated and untreated wood specimens were tied together using plastic cord, arranged into a raft like assembly, and then exposed for 3, 6, and 12 months to the brackish water situated at Rambut Island's coastal area. The Nordic Wood Preservation Council (NWPC) standard No.1.4.2.2/75 was used to determine the intensity of marine borer infestation. The results revealed that 19 out of those 25 species were classified as easy to be preser ved, four species as moderate, and the remaining two were difficult to be preser ved. Those 19 species, i.e. Tamarindus indica L., Diplodiscus sp., Ficus variegate R .Br., Ehretia acuminata R .Br., Meliocope lunu-ankenda (Gaertn) T.G. Hartley, Colona javanica B.L., Pouteria duclitanBachni., Stercularia oblongata R .Br., Ficus vasculosa Wall ex Miq., Callophyllum grandiflorum JJS., Turpinia sphaerocarpa Hassk., Neolitsea triplinervia Merr., Acer niveum Bl., Sloanea sigun Szysz., Castanopsis acuminatissima A.DC., Cinnamomum iners Reinw. Ex Blume., Litsea angulata Bl., Ficus nervosa Heyne., and Horsfieldia glabra Warb. were more permeable implying that the CCB retention and penetration were greater and deeper. Hymeneaecarboril.L., LitseaodoriferaVal., Gironniera subasqualisPlanch., and LinderapolyanthaBoerl. were moderately permeable. Castanopsis tunggurut A.DC. and Azadirachta indica Juss. were the least permeable judging that the CCB retention and penetration were lowest and shallowest. The treated wood specimens in this regard were able to prevent marine borers attack. Meanwhile, the untreated specimens were susceptible to marine borers attack, except Azadirachta indica. The attacking borers consecutively are MartesiastriataLinne that belongs to the Pholadidae family ; and Teredo bartschi Clapp., Dicyathifer manni Wright., and Bankia cieba Clench. to the Terdinidae family

    UNCOVERING AND MITIGATING UNSAFE PROGRAM INTEGRATIONS IN ANDROID

    Get PDF
    Android’s design philosophy encourages the integration of resources and functionalities from multiple parties, even with different levels of trust. Such program integrations, on one hand, connect every party in the Android ecosystem tightly on one single device. On the other hand, they can also pose severe security problems, if the security design of the underlying integration schemes is not well thought-out. This dissertation systematically evaluates the security design of three integration schemes on Android, including framework module, framework proxy and 3rd-party code embedding. With the security risks identified in each scheme, it concludes that program integrations on Android are unsafe. Furthermore, new frameworks have been designed and implemented to detect and mitigate the threats. The evaluation results on the prototypes have demonstrated their effectiveness

    Toxicology of Nuclear Polyhedrosis Virus, Botanical and Synthetic Pesticides on Mortality Rate of Crocidolomia binotalis (Zeller)

    Get PDF
    Crocidolomia binotalis (Cb) (Zeller) هي واحدة من الآفات الرئيسية للملفوف التي يصعب على المزارعين السيطرة عليها في منطقة بركان ايجن في إندونيسيا. يتزايد الطلب على الملفوف في إندونيسيا كل عام، لذلك يتم بذل جهود مكثفة باستمرار. يستخدم المزارعون بشكل مكثف مبيدات الآفات الاصطناعية كعنصر تحكم أساسي في Cb. ان الغرض من هذه الدراسة هو فحص العديد من عوامل التحكم التي يمكن استخدامها كبديل لمبيدات الآفات الاصطناعية. بعد ذلك، تقديم توصيات إلى مزارعي ايجن Crater للمساهمة في الحد من استخدام المبيدات الحشرية الاصطناعية. اعتمد المبيد الحيوي المستخدم على سلالات فيروس تعدد التعرق النووي من Spodoptera litura (SlNPV))) و Helicoverpa armigera (HaNPV))) ، ومبيدات الآفات النباتية ، ومبيدات الآفات الاصطناعية كعلاج مقارن. تم الحصول على عزلات SlNPv و HaNPV من المعهد الإندونيسي لأبحاث التحلية ومحاصيل الألياف. تأتي تركيبات مبيدات الآفات النباتية من مزيج من Azadiracta indica وAglaia  odorata  و Ageratum conyzoides والتي تم تجفيفها لمدة أسبوع وتم اقتراحها لتكوين دقيق. بعد ذلك، تم استخلاصه باستخدام 96٪ مذيب إيثانول، 0.5٪ بين 90 باستخدام مبخر دوار عند درجة حرارة 40 درجة مئوية. بالنسبة لمبيدات الآفات الاصطناعية، تستخدم المعالجة باستخدام المكون الفعال بيرميثرين 20 مجم L-1. تمت إعادة ترشيح cb الذي تم جمعه من الحقل في طبق بتري عن طريق توفير علف اصطناعي تم نقعه بهذه المادة لمدة 5 دقائق. تم العثور على أعلى نتائج اختبار الوفيات في صيغة مبيدات الآفات النباتية بقيمة 100٪ في 72 ساعة. تميل الوفيات في SlNPV و HaNPV إلى الاستقرار بحد أقصى 72.02٪. يمكن أن تكون نتائج اختبار الوفيات في المختبر توصية بمكافحة بديلة لآفات Cb في نباتات الملفوف في الحقل. في هذه الحالة، يُعد هذا جهدًا لتقليل اعتماد المزارعين على استخدام مبيدات الآفات الاصطناعية.Crocidolomia binotalis (Cb) (Zeller) is one of the main pests of cabbage which is difficult for farmers to control in the Ijen Crater in Indonesia. The demand for cabbage in Indonesia is increasing every year, so intensification efforts are continuously being made. Farmers intensively use synthetic pesticides as the primary control of Cb. The purpose of this study is to examine several control agents that can be used as an alternative to synthetic pesticides. Then, it provides recommendations to Ijen Crater farmers to adapt in reducing the use of synthetic pesticides. The biopesticide used was based on the Nuclear Polyhedrosis Virus strains of Spodoptera litura (SlNPV) and Helicoverpa armigera (HaNPV), botanical pesticides, and synthetic pesticides as a comparison treatment. SlNPv and HaNPV isolates were obtained from the Indonesian Sweetener and Fiber Crops Research Institute. The botanical pesticide formulas come from a combination of Azadiracta indica, Aglaia odorata, Ageratum conyzoides dried for one week and proposed to form flour. Then, it was extracted using 96% ethanol solvent, 0.5% tween 90 using a rotary evaporator at a temperature of 40oC. For synthetic pesticide, the treatment used the active ingredient Permethrin 20 mgL-1. The cb collected from the field was re-filtered in a Petri dish by providing artificial feed soaked with this material for 5 minutes. The highest mortality test results were found in the botanical pesticide formula with a value of 100% at 72 hours. Mortality in SlNPV and HaNPV tended to be stable with a maximum value of 72.02%. The results of mortality testing in the laboratory can be a recommendation for alternative control of Cb pests in cabbage plants in the field. In this case, it is an effort to reduce farmers' dependence on using synthetic pesticides
    corecore