400 research outputs found
A novel flexible model for piracy and robbery assessment of merchant ship operations
Maritime piracy and robbery can not only cause logistics chain disruption leading to economic consequences but also result in loss of lives, and short- and long-term health problems of seafarers and passengers. There is a justified need for further investigation in this area of paramount importance. This study analyses maritime piracy and robbery related incidents in terms of the major influencing factors such as ship characteristics and geographical locations. An analytical model incorporating Bayesian reasoning is proposed to estimate the likelihood of a ship being hijacked in the Western Indian or Eastern African region. The proposed model takes into account the characteristics of the ship, environment conditions and the maritime security measures in place in an integrated manner. Available data collected from the Global Integrated Shipping Information System (GISIS) together with expert judgement is used to develop and demonstrate the proposed model. This model can be used by maritime stakeholders to make cost-effective anti-piracy decisions in their operations under uncertainties. Discussions are given on industrial response to maritime piracy in order to minimize the risk to ships exposed to attacks from pirates. Further recommendations on how maritime security and piracy may be best addressed in terms of maritime security measures are outlined
Ethical Control of Unmanned Systems: lifesaving/lethal scenarios for naval operations
Prepared for: Raytheon Missiles & Defense under NCRADA-NPS-19-0227This research in Ethical Control of Unmanned Systems applies precepts of Network Optional Warfare (NOW) to develop a three-step Mission Execution Ontology (MEO) methodology for validating, simulating, and implementing mission orders for unmanned systems. First, mission orders are represented in ontologies that are understandable by humans and readable by machines. Next, the MEO is validated and tested for logical coherence using Semantic Web standards. The validated MEO is refined for implementation in simulation and visualization. This process is iterated until the MEO is ready for implementation. This methodology is applied to four Naval scenarios in order of increasing challenges that the operational environment and the adversary impose on the Human-Machine Team. The extent of challenge to Ethical Control in the scenarios is used to refine the MEO for the unmanned system. The research also considers Data-Centric Security and blockchain distributed ledger as enabling technologies for Ethical Control. Data-Centric Security is a combination of structured messaging, efficient compression, digital signature, and document encryption, in correct order, for round-trip messaging. Blockchain distributed ledger has potential to further add integrity measures for aggregated message sets, confirming receipt/response/sequencing without undetected message loss. When implemented, these technologies together form the end-to-end data security that ensures mutual trust and command authority in real-world operational environments—despite the potential presence of interfering network conditions, intermittent gaps, or potential opponent intercept. A coherent Ethical Control approach to command and control of unmanned systems is thus feasible. Therefore, this research concludes that maintaining human control of unmanned systems at long ranges of time-duration and distance, in denied, degraded, and deceptive environments, is possible through well-defined mission orders and data security technologies. Finally, as the human role remains essential in Ethical Control of unmanned systems, this research recommends the development of an unmanned system qualification process for Naval operations, as well as additional research prioritized based on urgency and impact.Raytheon Missiles & DefenseRaytheon Missiles & Defense (RMD).Approved for public release; distribution is unlimited
Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime
Cybercrime is a complex phenomenon that spans both technical and human
aspects. As such, two disjoint areas have been studying the problem from
separate angles: the information security community and the environmental
criminology one. Despite the large body of work produced by these communities
in the past years, the two research efforts have largely remained disjoint,
with researchers on one side not benefitting from the advancements proposed by
the other. In this paper, we argue that it would be beneficial for the
information security community to look at the theories and systematic
frameworks developed in environmental criminology to develop better mitigations
against cybercrime. To this end, we provide an overview of the research from
environmental criminology and how it has been applied to cybercrime. We then
survey some of the research proposed in the information security domain,
drawing explicit parallels between the proposed mitigations and environmental
criminology theories, and presenting some examples of new mitigations against
cybercrime. Finally, we discuss the concept of cyberplaces and propose a
framework in order to define them. We discuss this as a potential research
direction, taking into account both fields of research, in the hope of
broadening interdisciplinary efforts in cybercrime researc
Converting Pirates through Participative Schemes for Digital Goods: Exploring “Pay What You Want” and Persuasive Computing in Online Music
This study looks at how social factors can be leveraged to dissuade online piracy in digital This study leverage persuasive computing to influence consumers\u27 decision making process regarding their acquisition of online music and seeks to identify how different persuasive techniques can, in a pay way you want context, anchor the consumers\u27 reference price to an amount significantly different from 0
Maritime piracy situation modelling with dynamic Bayesian networks
A generative model for modelling maritime vessel behaviour is proposed. The model is a novel variant of the dynamic Bayesian network (DBN). The proposed DBN is in the form of a switching linear dynamic system (SLDS) that has been extended into a larger DBN. The application of synthetic data fabrication of maritime vessel behaviour is considered. Behaviour of various vessels in a maritime piracy situation is simulated. A means to integrate information from context based external factors that influence behaviour is provided. Simulated observations of the vessels kinematic states are generated. The generated data may be used for the purpose of developing and evaluating counter-piracy methods and algorithms. A novel methodology for evaluating and optimising behavioural models such as the proposed model is presented. The log-likelihood, cross entropy, Bayes factor and the Bhattacharyya distance measures are applied for evaluation. The results demonstrate that the generative model is able to model both spatial and temporal datasets.The Advanced Sensors and Electronics Defence (ASED) Centre of KACST through the Council for Scientific and Industrial Research (CSIR) and the South African National Research Foundation (NRF).http://www.elsevier.com/locate/inffushj201
A Cross-Disciplinary Approach to the Maritime Security Risk of Piracy and Lessons Learned From Agent-Based Modeling
This dissertation takes a cross-disciplinary approach to understanding pirate activity. Maritime piracy presents a dynamic ever-evolving problem. In today’s globalized world, contemporary maritime piracy presents a transnational threat. It is a complex socio-economic and political problem which the modern world considers to be criminal activity. Like all complex problems it must be deconstructed to fully comprehend it.
All criminal activity, maritime piracy included, has certain elements of supply and demand. For the activity to occur there must be a certain level, or supply, of targets. At the same time, we can posit that there must be a lack of other opportunities for the pirates, who calculate that the risk of engaging in piracy is worthwhile. This risk calculation is a function of the potential rewards minus the sum of the risks. An increase in pirate attacks creates a demand for better maritime security. An increase in maritime security causes an increase in risk to pirates. Improved pirate capabilities may decrease this risk. The result is a constantly evolving complex problem. This study proposes a parsimonious agent-based model, focused on the socio-economic and political variables that encourage piracy, with utility across many specific regional domains. By simplifying the details of certain aspects of the model, the focus is placed on the issues at the heart of the problem. This allows for new insights into the dynamic relationship between these factors
Detecção de ataques por canais laterais na camada física
Today, with the advent of IoT and the resulting fragmentation of wireless technologies,
they bring not only benefits, but also concerns. Daily, several individuals
communicate with each other using various communication methods. Individuals
use a variety of devices for innocuous day-to-day activities; however, there are
some malicious individuals (dishonest agents) whose aim is to cause harm, with
the exfiltration of information being one of the biggest concerns. Since the security
of Wi-Fi communications is one of the areas of greatest investment and research
regarding Internet security, dishonest agents make use of side channels to exfiltrate
information, namely Bluetooth. Most current solutions for anomaly detection on
networks are based on analyzing frames or packets, which, inadvertently, can reveal
user behavior patterns, which they consider to be private. In addition, solutions
that focus on inspecting physical layer data typically use received signal power
(RSSI) as a distance metric and detect anomalies based on the relative position
of the network nodes, or use the spectrum values directly on models classification
without prior data processing.
This Dissertation proposes mechanisms to detect anomalies, while ensuring the privacy
of its nodes, which are based on the analysis of radio activity in the physical
layer, measuring the behavior of the network through the number of active and
inactive frequencies and the duration of periods of silence and activity. After the
extraction of properties that characterize these metrics,an exploration and study
of the data is carried out, followed by the use of the result to train One-Class
Classification models.
The models are trained with data taken from a series of interactions between a
computer, an AP, and a mobile phone in an environment with reduced noise, in
an attempt to simulate a simplified home automation scenario. Then, the models
were tested with similar data but containing a compromised node, which periodically
sent a file to a local machine via a Bluetooth connection. The data show
that, in both situations, it was possible to achieve detection accuracy rates in the
order of 75 % and 99 %.
This work ends with some ideas of resource work, namely changes in the level
of pre-processing, ideas of new tests and how to reduce the percentage of false
negatives.Hoje, com o advento da IoT e a resultante fragmentação das tecnologias sem fio,
elas trazem não apenas benefícios, mas também preocupações. Diariamente vários
indivíduos se comunicam entre si usando vários métodos de comunicação. Os
indivíduos usam uma variedade de dispositivos para atividades inócuas do dia-adia;
no entanto, existem alguns indivíduos mal-intencionados (agentes desonestos)
cujo objetivo é causar danos, sendo a exfiltração de informação uma das maiores
preocupações. Sendo a segurança das comunicações Wi-Fi uma das áreas de
maior investimento e investigação no que toca a segurança na Internet, os agentes
desonestos fazem uso de canais laterais para exfiltrar informação, nomeadamente
o Bluetooth. A maioria das soluções atuais para deteção de anomalias em redes
baseiam-se em analisar tramas ou pacotes, o que, inadvertidamente, pode revelar
padrões de comportamento dos utilizadores, que estes considerem privados. Além
disso, as soluções que se focam em inspecionar dados da camada física normalmente
usam a potência de sinal recebido (RSSI) como uma métrica de distância
e detetam anomalias baseadas na posição relativa dos nós da rede, ou usam os
valores do espetro diretamente em modelos de classificação sem prévio tratamento
de dados.
Esta Dissertação propõe mecanismos para deteção de anomalias, assegurando simultaneamente
a privacidade dos seus nós, que se baseiam na análise de atividade
rádio na camada física, medindo os comportamentos da rede através do número
de frequências ativas e inativas e a duração de períodos de silêncio e atividade.
Depois da extração de propriedades que caracterizam estas métricas, é realizada
uma exploração dos dados e um estudo das mesmas, sendo depois usadas para
treinar modelos de classificação mono-classe.
Os modelos são treinados com dados retirados de uma série de interações entre
um computador, um AP, e um telemóvel num ambiente com ruído reduzido, numa
tentativa de simular um cenário de automação doméstica simplificado. De seguida,
os modelos foram testados com dados semelhantes mas contendo um nó comprometido,
que periodicamente enviava um ficheiro para uma máquina local através
de uma ligação Bluetooth. Os dados mostram que, em ambas as situações, foi
possível atingir taxas de precisão de deteção na ordem dos 75% e 99%.
Este trabalho finaliza com algumas ideias de trabalho futuro, nomeadamente alterações
ao nível do pré-processamento, ideias de novos testes e como diminuir a
percentagem de falsos negativos.Mestrado em Engenharia de Computadores e Telemátic
- …