106,308 research outputs found

    A survey of intrusion detection system technologies

    Get PDF
    This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting Supervisory Control And Data Acquisition (SCADA) and Cloud networks. Also by providing a review of varied studies ranging from issues in configuration and specific problems to custom techniques and cutting edge studies a reference can be provided to others interested in learning about and developing IDS solutions. Intrusion Detection is an area of much required study to provide solutions to satisfy evolving services and networks and systems that support them. This paper aims to be a reference for IDS technologies other researchers and developers interested in the field of intrusion detection

    Experience in using a typed functional language for the development of a security application

    Full text link
    In this paper we present our experience in developing a security application using a typed functional language. We describe how the formal grounding of its semantic and compiler have allowed for a trustworthy development and have facilitated the fulfillment of the security specification.Comment: In Proceedings F-IDE 2014, arXiv:1404.578

    Enabling quantitative data analysis through e-infrastructures

    Get PDF
    This paper discusses how quantitative data analysis in the social sciences can engage with and exploit an e-Infrastructure. We highlight how a number of activities which are central to quantitative data analysis, referred to as ‘data management’, can benefit from e-infrastructure support. We conclude by discussing how these issues are relevant to the DAMES (Data Management through e-Social Science) research Node, an ongoing project that aims to develop e-Infrastructural resources for quantitative data analysis in the social sciences

    Utilising semantic technologies for decision support in dementia care

    Get PDF
    The main objective of this work is to discuss our experience in utilising semantic technologies for building decision support in Dementia care systems that are based on the non-intrusive on the non-intrusive monitoring of the patient’s behaviour. Our approach adopts context-aware modelling of the patient’s condition to facilitate the analysis of the patient’s behaviour within the inhabited environment (movement and room occupancy patterns, use of equipment, etc.) with reference to the semantic knowledge about the patient’s condition (history of present of illness, dependable behaviour patterns, etc.). The reported work especially focuses on the critical role of the semantic reasoning engine in inferring medical advice, and by means of practical experimentation and critical analysis suggests important findings related to the methodology of deploying the appropriate semantic rules systems, and the dynamics of the efficient utilisation of complex event processing technology in order to the meet the requirements of decision support for remote healthcare systems

    Evaluation of Rumble Stripes on Low-Volume Rural Roads in Iowa—Phase II Final Report, November 2011

    Get PDF
    Single-vehicle run-off-road crashes are the most common crash type on rural two-lane Iowa roads. Rumble strips have proven effective in mitigating these crashes, but the strips are commonly installed in paved shoulders on higher-volume roads that are owned by the State of Iowa. Lower-volume paved rural roads owned by local agencies do not commonly feature paved shoulders but frequently experience run-off-road crashes. This project involved installing rumble stripes, which are a combination of conventional rumble strips with a painted edge line placed on the surface of the milled area, along the edge of the travel lanes, but at a narrow width to avoid possible intrusion into the normal vehicle travel paths. The research described in this report was part of a project funded by the Federal Highway Administration, Iowa Highway Research Board, and Iowa Department of Transportation to evaluate the effectiveness of edge-line rumble strips in Iowa. The project evaluated the effectiveness of rumble stripes in reducing run-off-road crashes and in improving the longevity and wet-weather visibility of edge-line markings. This project consisted of two phases. The first phase was to select pilot study locations, select a set of test sites, install rumble stripes, summarize lessons learned during installation, and provide a preliminary assessment of the rumble stripes’ performance. The purpose of this report was to document results from Phase II. A before and after crash analysis was conducted to assess whether use of the treatment had resulted in fewer crashes. However, due to low sample size, results of the analysis were inconclusive. Lateral position was also evaluated before and after installation of the treatment to determine whether vehicles engaged in better lane keeping. Pavement marking wear was also assessed

    Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses

    Get PDF
    Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation-pattern dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems

    Tiresias: Predicting Security Events Through Deep Learning

    Full text link
    With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (e.g., whether an attack would happen or not), but not at the specific steps that an attacker would undertake. To fill this gap we present Tiresias, a system that leverages Recurrent Neural Networks (RNNs) to predict future events on a machine, based on previous observations. We test Tiresias on a dataset of 3.4 billion security events collected from a commercial intrusion prevention system, and show that our approach is effective in predicting the next event that will occur on a machine with a precision of up to 0.93. We also show that the models learned by Tiresias are reasonably stable over time, and provide a mechanism that can identify sudden drops in precision and trigger a retraining of the system. Finally, we show that the long-term memory typical of RNNs is key in performing event prediction, rendering simpler methods not up to the task
    corecore