62,446 research outputs found

    Network attack detection at flow level

    Full text link
    In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application. The method developed allows us not only to detect the most common types of network attack (DDoS and port scanning), but also to make a list of trespassers' IP-addresses. Therefore, this method can be applied in intrusion detection systems, and in those systems which lock these IP-addresses

    Water Integration for Squamscott Exeter (WISE): Preliminary Integrated Plan, Final Technical Report

    Get PDF
    This document introduces the goals, background and primary elements of an Integrated Plan for the Lower Exeter and Squamscott River in the Great Bay estuary in southern New Hampshire. This Plan will support management of point (wastewater treatment plant) and nonpoint sources in the communities of Exeter, Stratham and Newfields. The Plan also identifies and quantifies the advantages of the use of green infrastructure as a critical tool for nitrogen management and describes how collaboration between those communities could form the basis for an integrated plan. The Plan will help communities meet new wastewater and proposed stormwater permit requirements. Critical next steps are need before this Plan will fulfill the 2018 Nitrogen Control Plan requirements for Exeter and proposed draft MS4 requirements for both Stratham and Exeter. These next steps include conducting a financial capability assessment, development of an implementation schedule and development of a detailed implementation plan. The collaborative process used to develop this Plan was designed to provide decision makers at the local, state and federal levels with the knowledge they need to trust the Plan’s findings and recommendations, and to enable discussions between stakeholders to continue the collaborative process. This Plan includes the following information to guide local response to new federal permit requirements for treating and discharging stormwater and wastewater: Sources of annual pollutant load quantified by type and community; Assessment and evaluation of different treatment control strategies for each type of pollutant load; Assessment and evaluation of nutrient control strategies designed to reduce specific types of pollutants; Evaluation of a range of point source controls at the wastewater treatment facility based on regulatory requirements; Costs associated with a range of potential control strategies to achieve reduction of nitrogen and other pollutants of concern; and A preliminary implementation schedule with milestones for target load reductions using specific practices for specific land uses at points in time; Recommendations on how to implement a tracking and accounting program to document implementation; Design tools such as BMP performance curves for crediting the use of structural practices to support nitrogen accounting requirements; and Next Steps for how to complete this Plan

    SSHCure: a flow-based SSH intrusion detection system

    Get PDF
    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the inspection of individual packets and, hence, do not scale to today's high-speed networks. To overcome this issue, this paper proposes SSHCure, a flow-based intrusion detection system for SSH attacks. It employs an efficient algorithm for the real-time detection of ongoing attacks and allows identification of compromised attack targets. A prototype implementation of the algorithm, including a graphical user interface, is implemented as a plugin for the popular NfSen monitoring tool. Finally, the detection performance of the system is validated with empirical traffic data

    The Intellectual and Technical Property Components of pro-Vitamin A Rice (GoldenRiceTM): A Preliminary Freedom-To-Operate Review

    Get PDF
    Rice is a staple food for millions of people, predominantly in Asia, but lacks essential nutritional components such as Vitamin A. This is very important for over 180 million children and women of child bearing age who suffer from Vitamin A deficiency in Asia alone. For this reason, an improvement was made under an effort led by Profs. Ingo Potrykus and Peter Beyer by inserting several genes into rice to produce an improved product called GoldenRice. Because GoldenRice has the potential to be easily integrated into the farming systems of the world\u27s poorer regions, the advent of GoldenRice promises to go a long way towards solving Asia\u27s Vitamin A deficiency problem in an effective, inexpensive, and sustainable way. As a result of the increasing complexity of the intellectual property (IP) framework under which the international agricultural development community operates, the Rockefeller Foundation funded an ISAAA project to conduct a selective Freedom-To-Operate (FTO) analysis of GoldenRice with the objectives of reviewing the IP and Technical Property (TP; or tangible property) components associated with GoldenRice; providing institutions interested in distributing GoldenRice with the information needed to develop strategic options for handling the proprietary science embedded in the product; and developing possible alternative strategies on how the IP/TP constraints could be managed effectively. Any FTO opinion is a risk management opinion and its results vary on a country-by-country basis. It is a dynamic opinion; never a definitive answer. Hence the present document serves as an analytical framework that can serve as the basis of a legal FTO review

    OPTIMAL TESTING STRATEGIES FOR GENETICALLY MODIFIED WHEAT

    Get PDF
    A stochastic optimization model was developed to determine optimal testing strategies, costs, and risks of a dual marketing system. The model chooses the testing strategy (application, intensity, and tolerance) that maximizes utility (minimizes disutility) of additional system costs due to testing and quality loss and allows simulation of the risk premium required to induce grain handlers to undertake a dual marketing system versus a Non-GM system. Cost elements including those related to testing, quality loss, and a risk premium were estimated for a model representing a grain export chain. Uncertainties were incorporated and include test accuracy, risk of adventitious commingling throughout, and variety declaration. Sensitivities were performed for effects of variety risks, penalty differentials, re-elevation discounts, import tolerances, variety declaration, risk aversion, GM adoption, and domestic end-user.Segregation, Testing, Tolerance, Genetically Modified, Wheat, Risk Premium, Crop Production/Industries, Research and Development/Tech Change/Emerging Technologies,

    National Accounts for a Global Economy: the Case of Ireland. Quarterly Economic Commentary Special Article, Summer 2018

    Get PDF
    Globalisation is affecting the way economic activity is reflected in the National Accounts. Intellectual property, which is now part of the capital stock, interacts with the choice of global firms as to their legal structure, producing different national accounting outcomes for individual countries. This is but one manifestation of the challenges that a global economy presents for national accounting. Using the example of Ireland, consideration is given to the data needed to meet the needs of users of National Accounts. In particular, more information is required to separately identify all the activity of multinational enterprises and domestically owned firms. This paper suggests a set of satellite accounts for Ireland that would show how changes in the economy affect the economic welfare of Irish residents
    corecore