59 research outputs found

    Kalėjimo sampratos raida Viktoro Pelevino kūryboje

    Get PDF
    This article describes the evolution of the concept of the prison in the texts of Victor Pelevin. The prison image changes throughout the author’s works, and the article compares his early stories The Yellow Arrow and Hermit and Six-Toes with his later story Stolypin. The article describes the evolution of the paired heroes as well of the stories: the student and the teacher. Using the evolution of the heroes as a model, the article shows how in Pelevin’s early stories the prison becomes a place from which one can escape, a metaphor for Soviet and post-Soviet society of the 90s, and the heroes of early Pelevin are able to escape with the help of their connection to culture and clues scattered in the surrounding world. The heroes of the story Stolypin – oligarchs, in spite of staying within the same student–teacher paradigm, represent a deconstruction of their predecessors, devoid of any interests other than mercantile ones, and in many ways parody the heroes of The Yellow Arrow and Hermit and the Six-Toes. The image of the prison wagon from the story Stolypin is a metaphor for modern Russia.Šiame straipsnyje aprašoma kalėjimo sampratos evoliucija Viktoro Pelevino kūryboje. Kalėjimo įvaizdis autoriaus kūryboje kinta, straipsnyje lyginamos jo ankstyvojo periodo apysakos „Geltonoji strėlė“ ir „Atsiskyrėlis ir Šešiapirštis“ su vėlyvuoju „Stolypinu“. Taip pat aprašoma kūrinių herojų – mokinio ir mokytojo evoliucija. Remiantis herojų evoliucija kaip pavyzdžiu straipsnyje parodyta, kaip ankstyvosiose Pelevino apysakose kalėjimas tampa vieta, iš kurios galima pabėgti/ Tai Sovietų ir posovietinės dešimtojo dešimtmečio visuomenės metafora. Ankstyvosios Pelevino kūrybos herojai, puoselėdami ryšį su kultūra, gali iš tokio kalėjimo ištrūkti. „Stolypino“ apsakymo herojai – oligarchai, kurie nors ir toliau veikia toje pačioje mokinio-mokytojo paradigmoje, yra savo pirmtakų dekonstrukcija, jie neturi jokių interesų, išskyrus merkantilinius, ir daugeliu atžvilgių parodijuoja „Geltonosios strėlės“, „Atsiskyrėlio ir Šešiapirščio“ herojus. Kalėjimo vagono vaizdas apsakyme „Stolypinas“ yra šiuolaikinės Rusijos metafora

    Composite DoS attack model

    Get PDF
    Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyberattack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization. Article in English. Jungtinis DoS atakų modelis Santrauka. Siekiant užkirsti kelią bet kokioms sistemų saugumo grėsmėms, vienas iš svarbiausių uždavinių yra prevencija. Tai leidžia numatyti galimus pavojus ir kovos su jais būdus, nustatyti jų efektyvumą ir pan. Tačiau realiai eksperimentuoti su turima sistema dažnai gali būti pernelyg sudėtinga, todėl daug lengviau šią problemą spręsti padeda matematiniai / programiniai modeliai. Straipsnyje siūlomas naujas DoS atakų modelis, sujungiantis kelių tipų DoS atakas (srauto ir atminties išnaudojimo, netinkamo filtrų nustatymo) ir jų įtaką viena kitai. Remiantis šiuo naujai sukurtu modeliu atlikti eksperimentai, kurių metu vertinama skirtingų atakos ir aukos savybių reikšmių įtaka bendrai atakos sėkmės tikimybei. Raktiniai žodžiai: elektroninės paslaugos trikdymo ataka; modelis; DoS; DDo

    Malicious botnet survivability mechanism evolution forecasting by means of a genetic algorithm

    Get PDF
    Botnets are considered to be among the most dangerous modern malware types and the biggest current threats to global IT infrastructure. Botnets are rapidly evolving, and therefore forecasting their survivability strategies is important for the development of countermeasure techniques. The article propose the botnet-oriented genetic algorithm based model framework, which aimed at forecasting botnet survivability mechanisms. The model may be used as a framework for forecasting the evolution of other characteristics. The efficiency of different survivability mechanisms is evaluated by applying the proposed fitness function. The model application area also covers scientific botnet research and modelling tasks. Article in English. Kenkėjiškų botnet tinklų išgyvenamumo mechanizmų evoliucijos prognozavimas genetinio algoritmo priemonėmis Santrauka. Botnet tinklai pripažįstami kaip vieni pavojingiausių šiuolaikinių kenksmingų programų ir vertinami kaip viena iš didžiausių grėsmių tarptautinei IT infrastruktūrai. Botnettinklai greitai evoliucionuoja, todėl jų savisaugos mechanizmų evoliucijos prognozavimas yra svarbus planuojant ir kuriant kontrpriemones. Šiame straipsnyje pateikiamas genetiniu algoritmu pagrįstas modelis, skirtas Botnet tinklų savisaugos mechanizmų evoliucijai prognozuoti, kuris taip pat gali būti naudojamas kaip pagrindas kitų Botnet tinklų savybių evoliucijai modeliuoti. Skirtingi savisaugos mechanizmai vertinami taikant siūlomą tinkamumo funkciją. Raktiniai žodžiai: Botnet; genetinis algoritmas; prognozė; savisauga; evoliucija; modeli

    Chaos parameters for EEG analysis

    Get PDF
    The possibility to apply nonlinear dynamics methods for the EEG time series analysis is investigated. Problems related with the estimation of the chaos parameters from the physiological data are discussed

    Asymptotic power law of moments in a random multiplicative process with weak additive noise

    Get PDF
    It is well known that a random multiplicative process with weak additive noise generates a power-law probability distribution. It has recently been recognized that this process exhibits another type of power law: the moment of the stochastic variable scales as a function of the additive noise strength. We clarify the mechanism for this power-law behavior of moments by treating a simple Langevin-type model both approximately and exactly, and argue this mechanism is universal. We also discuss the relevance of our findings to noisy on-off intermittency and to singular spatio-temporal chaos recently observed in systems of non-locally coupled elements.Comment: 11 pages, 9 figures, submitted to Phys. Rev.

    State-of-the-art web data extraction systems for online business intelligence

    Get PDF
    The success of a company hinges on identifying and responding to competitive pressures. The main objective of online business intelligence is to collect valuable information from many Web sources to support decision making and thus gain competitive advantage. However, the online business intelligence presents non-trivial challenges to Web data extraction systems that must deal with technologically sophisticated modern Web pages where traditional manual programming approaches often fail. In this paper, we review commercially available state-of-the-art Web data extraction systems and their technological advances in the context of online business intelligence.Keywords: online business intelligence, Web data extraction, Web scrapingŠiuolaikinės iš tinklalapių duomenis renkančios ir verslo analitikai tinkamos sistemos (anglų k.)Tomas Grigalis, Antanas Čenys Santrauka Šiuolaikinės verslo organizacijos sėkmė priklauso nuo sugebėjimo atitinkamai reaguoti į nuolat besi­keičiančią konkurencinę aplinką. Internete veikian­čios verslo analitinės sistemos pagrindinis tikslas yra rinkti vertingą informaciją iš daugybės skirtingų internetinių šaltinių ir tokiu būdu padėti verslo orga­nizacijai priimti tinkamus sprendimus ir įgyti kon­kurencinį pranašumą. Tačiau informacijos rinkimas iš internetinių šaltinių yra sudėtinga problema, kai informaciją renkančios sistemos turi gerai veikti su itin technologiškai sudėtingais tinklalapiais. Šiame straipsnyje verslo analitikos kontekste apžvelgiamos pažangiausios internetinių duomenų rinkimo siste­mos. Taip pat pristatomi konkretūs scenarijai, kai duomenų rinkimo sistemos gali padėti verslo anali­tikai. Straipsnio pabaigoje autoriai aptaria pastarųjų metų technologinius pasiekimus, kurie turi potencia­lą tapti visiškai automatinėmis internetinių duomenų rinkimo sistemomis ir dar labiau patobulinti verslo analitiką bei gerokai sumažinti jos išlaidas

    Security Ontology for Adaptive Mapping of Security Standards

    Get PDF
    Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has to be done when more than one security standard is employed in order to prevent redundant activities, not optimal resource management and unnecessary outlays. Employment of security ontology to map different standards can reduce the mapping complexity however the choice of security ontology is of high importance and there are no analyses on security ontology suitability for adaptive standards mapping. In this paper we analyze existing security ontologies by comparing their general properties, OntoMetric factors and ability to cover different security standards. As none of the analysed security ontologies were able to cover more than 1/3 of security standards, we proposed a new security ontology, which increased coverage of security standards compared to the existing ontologies and has a better branching and depth properties for ontology visualization purposes. During this research we mapped 4 security standards (ISO 27001, PCI DSS, ISSA 5173 and NISTIR 7621) to the new security ontology, therefore this ontology and mapping data can be used for adaptive mapping of any set of these security standards to optimize usage of multiple securitystandards in an organization

    Automated Expert System Knowledge Base Development Method for Information Security Risk Analysis

    Get PDF
    Information security risk analysis is a compulsory requirement both from the side of regulating documents and information security management decision making process. Some researchers propose using expert systems (ES) for process automation, but this approach requires the creation of a high-quality knowledge base. A knowledge base can be formed both from expert knowledge or information collected from other sources of information. The problem of such approach is that experts or good quality knowledge sources are expensive. In this paper we propose the problem solution by providing an automated ES knowledge base development method. The method proposed is novel since unlike other methods it does not integrate ontology directly but utilizes automated transformation of existing information security ontology elements into ES rules: The Web Ontology Rule Language (OWL RL) subset of ontology is segregated into Resource Description Framework (RDF) triplets, that are transformed into Rule Interchange Format (RIF); RIF rules are converted into Java Expert System Shell (JESS) knowledge base rules. The experiments performed have shown the principal method applicability. The created knowledge base was later verified by performing comparative risk analysis in a sample company

    Detecting nonlinearity in multivariate time series

    Full text link
    We propose an extension to time series with several simultaneously measured variables of the nonlinearity test, which combines the redundancy -- linear redundancy approach with the surrogate data technique. For several variables various types of the redundancies can be defined, in order to test specific dependence structures between/among (groups of) variables. The null hypothesis of a multivariate linear stochastic process is tested using the multivariate surrogate data. The linear redundancies are used in order to avoid spurious results due to imperfect surrogates. The method is demonstrated using two types of numerically generated multivariate series (linear and nonlinear) and experimental multivariate data from meteorology and physiology.Comment: 11 pages, compressed and uuencoded postscript file, figures included. Also available by anonymous ftp at ftp://ftp.santafe.edu/pub/mp/multi, E-mail: [email protected], [email protected]

    Information security management framework suitability estimation for small and medium enterprise

    Get PDF
    Information security is one of the key concerns of an enterprise or organization. To assure suitable management of information security a list of information security management frameworks has been developed by a number of institutions and authors. A condensed information in information security management framework is very important to a small and medium enterprise as this type of enterprise usually lacks resources for information security expertise and deep analysis. Despite the fact, the information security management process and its frameworks, on the other hand, are very complex and require a big number of different elements. At the moment the comparison it is very shallow, as all properties of the comparison are treated equally important. In real life, the importance of different criteria of information security management framework and their suitability for small and medium enterprise vary. Therefore we use the Analytic Hierarchy Process to construct a hierarchy of information security management frameworks quality and applicability in small and medium enterprise and define the weights for each of the criteria. Weighted criteria express the importance of the criteria and executed the final comparison of alternatives (five information security management frameworks) is more realistic (similar to experts opinion) comparing to existing comparisons
    corecore