63 research outputs found

    Controlled DDoS Attack on IPv4/IPv6 Network Using Distributed Computing Infrastructure

    Get PDF
    The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring. DDoS attacks are still serious threat in both IPv4 and IPv6 networks and creation of simple tool to test the network for DDoS attack and to allow evaluation of vulnerabilities and DDoS countermeasures of the networks is necessary. In proposed testbed, Ansible orchestration tool is employed to perform and coordinate DDoS attacks. Ansible is a powerful tool and simplifies the implementation of the test environment. Moreover, no special hardware is required for the attacks execution, the testbed uses existing infrastructure in an organization. The case study of implementation of this environment shows straightforwardness to create a testbed comparable with a botnet with ten thousand bots. Furthermore, the experimental results demonstrate the potential of the proposed environment and present the impact of the attacks on particular target servers in IPv4 and IPv6 networks

    Visualising network security attacks with multiple 3D visualisation and false alert classification

    Get PDF
    Increasing numbers of alerts produced by network intrusion detection systems (NIDS) have burdened the job of security analysts especially in identifying and responding to them. The tasks of exploring and analysing large quantities of communication network security data are also difficult. This thesis studied the application of visualisation in combination with alerts classifier to make the exploring and understanding of network security alerts data faster and easier. The prototype software, NSAViz, has been developed to visualise and to provide an intuitive presentation of the network security alerts data using interactive 3D visuals with an integration of a false alert classifier. The needs analysis of this prototype was based on the suggested needs of network security analyst's tasks as seen in the literatures. The prototype software incorporates various projections of the alert data in 3D displays. The overview was plotted in a 3D plot named as "time series 3D AlertGraph" which was an extension of the 2D histographs into 3D. The 3D AlertGraph was effectively summarised the alerts data and gave the overview of the network security status. Filtering, drill-down and playback of the alerts at variable speed were incorporated to strengthen the analysis. Real-time visual observation was also included. To identify true alerts from all alerts represents the main task of the network security analyst. This prototype software was integrated with a false alert classifier using a classification tree based on C4.5 classification algorithm to classify the alerts into true and false. Users can add new samples and edit the existing classifier training sample. The classifier performance was measured using k-fold cross-validation technique. The results showed the classifier was able to remove noise in the visualisation, thus making the pattern of the true alerts to emerge. It also highlighted the true alerts in the visualisation. Finally, a user evaluation was conducted to find the usability problems in the tool and to measure its effectiveness. The feed backs showed the tools had successfully helped the task of the security analyst and increased the security awareness in their supervised network. From this research, the task of exploring and analysing a large amount of network security data becomes easier and the true attacks can be identified using the prototype visualisation tools. Visualisation techniques and false alert classification are helpful in exploring and analysing network security data.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Developing new techniques to analyse and classify EEG signals

    Get PDF
    A massive amount of biomedical time series data such as Electroencephalograph (EEG), electrocardiography (ECG), Electromyography (EMG) signals are recorded daily to monitor human performance and diagnose different brain diseases. Effectively and accurately analysing these biomedical records is considered a challenge for researchers. Developing new techniques to analyse and classify these signals can help manage, inspect and diagnose these signals. In this thesis novel methods are proposed for EEG signals classification and analysis based on complex networks, a statistical model and spectral graph wavelet transform. Different complex networks attributes were employed and studied in this thesis to investigate the main relationship between behaviours of EEG signals and changes in networks attributes. Three types of EEG signals were investigated and analysed; sleep stages, epileptic and anaesthesia. The obtained results demonstrated the effectiveness of the proposed methods for analysing these three EEG signals types. The methods developed were applied to score sleep stages EEG signals, and to analyse epileptic, as well as anaesthesia EEG signals. The outcomes of the project will help support experts in the relevant medical fields and decrease the cost of diagnosing brain diseases

    Pameran Reka Cipta, Penyelidikan dan Inovasi (PRPI) 2009

    Get PDF
    PRPI 2009 kini telah memasuki tahun penganjurannya yang ke-7. Pameran penyelidikan di UPM telah bermula sejak tahun 1997 semasa Exhibition & Seminar Harnessing for Industry Advantage. Pada tahun 2002, Pameran Reka Cipta dan Penyelidikan (PRP) buat pertama kali telah diadakan dengan menggunakan konsep pertandingan hasil projek penyelidikan yang telah dijalankan oleh para penyelidik UPM. Kejayaan penganjuran PRP 2002 telah merintis usaha untuk menjadikannya sebagai aktiviti tahunan UPM dan ianya terus berkembang sejajar dengan nama baharunya yang ditukar kepada Pameran Reka Cipta, Penyelidikan dan Inovasi yang bermula penganjurannya pada tahun 2005. Sebagai kesinambungan daripada kejayaan penganjuran PRPI 2006, 2007 dan 2008 yang lalu dan status UPM sebagai salah sebuah Universiti Penyelidikan, PRPI 2009 kali ini yang merupakan pameran penyelidikan yang terbesar di UPM terus dilaksanakan dengan aspirasi dan semangat yang lebih jitu. Pameran ini juga menjadi pelantar kepada para penyelidik untuk mengenengahkan hasil penyelidikan yang dijalankan dan penemuan baharu kepada umum. Di samping itu ianya juga menjadi penanda aras terhadap kualiti sesuatu projek penyelidikan bagi melayakkan para penyelidik UPM untuk menyertai pameran di peringkat kebangsaan dan seterusnya antarabangsa. Adalah diharapkan pelaksanaan PRPI 2009 ini akan dapat menyemarakkan budaya penyelidikan di kalangan staf dan juga pelajar UPM sekaligus menjadikan UPM sebagai Universiti Penyelidikan yang cemerlang di negara ini

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link

    Enhancing Computer Network Security through Improved Outlier Detection for Data Streams

    Get PDF
    V několika posledních letech se metody strojového učení (zvláště ty zabývající se detekcí odlehlých hodnot - OD) v oblasti kyberbezpečnosti opíraly o zjišťování anomálií síťového provozu spočívajících v nových schématech útoků. Detekce anomálií v počítačových sítích reálného světa se ale stala stále obtížnější kvůli trvalému nárůstu vysoce objemných, rychlých a dimenzionálních průběžně přicházejících dat (SD), pro která nejsou k dispozici obecně uznané a pravdivé informace o anomalitě. Účinná detekční schémata pro vestavěná síťová zařízení musejí být rychlá a paměťově nenáročná a musejí být schopna se potýkat se změnami konceptu, když se vyskytnou. Cílem této disertace je zlepšit bezpečnost počítačových sítí zesílenou detekcí odlehlých hodnot v datových proudech, obzvláště SD, a dosáhnout kyberodolnosti, která zahrnuje jak detekci a analýzu, tak reakci na bezpečnostní incidenty jako jsou např. nové zlovolné aktivity. Za tímto účelem jsou v práci navrženy čtyři hlavní příspěvky, jež byly publikovány nebo se nacházejí v recenzním řízení časopisů. Zaprvé, mezera ve volbě vlastností (FS) bez učitele pro zlepšování již hotových metod OD v datových tocích byla zaplněna navržením volby vlastností bez učitele pro detekci odlehlých průběžně přicházejících dat označované jako UFSSOD. Následně odvozujeme generický koncept, který ukazuje dva aplikační scénáře UFSSOD ve spojení s online algoritmy OD. Rozsáhlé experimenty ukázaly, že UFSSOD coby algoritmus schopný online zpracování vykazuje srovnatelné výsledky jako konkurenční metoda upravená pro OD. Zadruhé představujeme nový aplikační rámec nazvaný izolovaný les založený na počítání výkonu (PCB-iForest), jenž je obecně schopen využít jakoukoliv online OD metodu založenou na množinách dat tak, aby fungovala na SD. Do tohoto algoritmu integrujeme dvě varianty založené na klasickém izolovaném lese. Rozsáhlé experimenty provedené na 23 multidisciplinárních datových sadách týkajících se bezpečnostní problematiky reálného světa ukázaly, že PCB-iForest jasně překonává už zavedené konkurenční metody v 61 % případů a dokonce dosahuje ještě slibnějších výsledků co do vyváženosti mezi výpočetními náklady na klasifikaci a její úspěšností. Zatřetí zavádíme nový pracovní rámec nazvaný detekce odlehlých hodnot a rozpoznávání schémat útoku proudovým způsobem (SOAAPR), jenž je na rozdíl od současných metod schopen zpracovat výstup z různých online OD metod bez učitele proudovým způsobem, aby získal informace o nových schématech útoku. Ze seshlukované množiny korelovaných poplachů jsou metodou SOAAPR vypočítány tři různé soukromí zachovávající podpisy podobné otiskům prstů, které charakterizují a reprezentují potenciální scénáře útoku s ohledem na jejich komunikační vztahy, projevy ve vlastnostech dat a chování v čase. Evaluace na dvou oblíbených datových sadách odhalila, že SOAAPR může soupeřit s konkurenční offline metodou ve schopnosti korelace poplachů a významně ji překonává z hlediska výpočetního času . Navíc se všechny tři typy podpisů ve většině případů zdají spolehlivě charakterizovat scénáře útoků tím, že podobné seskupují k sobě. Začtvrté představujeme algoritmus nepárového kódu autentizace zpráv (Uncoupled MAC), který propojuje oblasti kryptografického zabezpečení a detekce vniknutí (IDS) pro síťovou bezpečnost. Zabezpečuje síťovou komunikaci (autenticitu a integritu) kryptografickým schématem s podporou druhé vrstvy kódy autentizace zpráv, ale také jako vedlejší efekt poskytuje funkcionalitu IDS tak, že vyvolává poplach na základě porušení hodnot nepárového MACu. Díky novému samoregulačnímu rozšíření algoritmus adaptuje svoje vzorkovací parametry na základě zjištění škodlivých aktivit. Evaluace ve virtuálním prostředí jasně ukazuje, že schopnost detekce se za běhu zvyšuje pro různé scénáře útoku. Ty zahrnují dokonce i situace, kdy se inteligentní útočníci snaží využít slabá místa vzorkování.ObhájenoOver the past couple of years, machine learning methods - especially the Outlier Detection (OD) ones - have become anchored to the cyber security field to detect network-based anomalies rooted in novel attack patterns. Due to the steady increase of high-volume, high-speed and high-dimensional Streaming Data (SD), for which ground truth information is not available, detecting anomalies in real-world computer networks has become a more and more challenging task. Efficient detection schemes applied to networked, embedded devices need to be fast and memory-constrained, and must be capable of dealing with concept drifts when they occur. The aim of this thesis is to enhance computer network security through improved OD for data streams, in particular SD, to achieve cyber resilience, which ranges from the detection, over the analysis of security-relevant incidents, e.g., novel malicious activity, to the reaction to them. Therefore, four major contributions are proposed, which have been published or are submitted journal articles. First, a research gap in unsupervised Feature Selection (FS) for the improvement of off-the-shell OD methods in data streams is filled by proposing Unsupervised Feature Selection for Streaming Outlier Detection, denoted as UFSSOD. A generic concept is retrieved that shows two application scenarios of UFSSOD in conjunction with online OD algorithms. Extensive experiments have shown that UFSSOD, as an online-capable algorithm, achieves comparable results with a competitor trimmed for OD. Second, a novel unsupervised online OD framework called Performance Counter-Based iForest (PCB-iForest) is being introduced, which generalized, is able to incorporate any ensemble-based online OD method to function on SD. Two variants based on classic iForest are integrated. Extensive experiments, performed on 23 different multi-disciplinary and security-related real-world data sets, revealed that PCB-iForest clearly outperformed state-of-the-art competitors in 61 % of cases and even achieved more promising results in terms of the tradeoff between classification and computational costs. Third, a framework called Streaming Outlier Analysis and Attack Pattern Recognition, denoted as SOAAPR is being introduced that, in contrast to the state-of-the-art, is able to process the output of various online unsupervised OD methods in a streaming fashion to extract information about novel attack patterns. Three different privacy-preserving, fingerprint-like signatures are computed from the clustered set of correlated alerts by SOAAPR, which characterize and represent the potential attack scenarios with respect to their communication relations, their manifestation in the data's features and their temporal behavior. The evaluation on two popular data sets shows that SOAAPR can compete with an offline competitor in terms of alert correlation and outperforms it significantly in terms of processing time. Moreover, in most cases all three types of signatures seem to reliably characterize attack scenarios to the effect that similar ones are grouped together. Fourth, an Uncoupled Message Authentication Code algorithm - Uncoupled MAC - is presented which builds a bridge between cryptographic protection and Intrusion Detection Systems (IDSs) for network security. It secures network communication (authenticity and integrity) through a cryptographic scheme with layer-2 support via uncoupled message authentication codes but, as a side effect, also provides IDS-functionality producing alarms based on the violation of Uncoupled MAC values. Through a novel self-regulation extension, the algorithm adapts its sampling parameters based on the detection of malicious actions on SD. The evaluation in a virtualized environment clearly shows that the detection rate increases over runtime for different attack scenarios. Those even cover scenarios in which intelligent attackers try to exploit the downsides of sampling

    Temperature aware power optimization for multicore floating-point units

    Full text link

    Food for All

    Get PDF
    This book is a historical review of international food and agriculture since the founding of the international organizations following the Second World War, including the World Bank and the Food and Agriculture Organization of the United Nations (FAO), the World Food Programme (WFP) and into the 1970s, when CGIAR was established and the International Fund for Agricultural Development (IFAD) was created to recycle petrodollars. The book concurrently focuses on the structural transformation of developing countries in Asia and Africa, with some making great strides in small farmer development and in achieving structural transformation of their economies. Some have also achieved Sustainable Development Goals (SDGs), particularly SDG2, but most have not. Not only are some countries, particularly in South Asia and sub-Saharan Africa, lagging behind, but they face new challenges of climate change, competition from emerging countries, population pressure, urbanization, environmental decay, dietary transition, and now pandemics. Lagging developing countries need huge investments in human capital, and physical and institutional infrastructure, to take advantage of rapid change in technologies, but the role of international assistance in financial transfers has diminished. The COVID-19 pandemic has not only set many poorer countries back but starkly revealed the weaknesses of past strategies. Transformative changes are needed in developing countries with international cooperation to achieve better outcomes. Will the change in US leadership bring new opportunities for multilateral cooperation
    corecore