36 research outputs found

    АНАЛІЗ ВИКОРИСТАННЯ ПРОГРАМНИХ ПРИМАНОК ЯК ЗАСОБУ ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ

    Get PDF
    This article analyses the usage of software baits as an information security asset. They provided close research about honeypot types, their advantages and disadvantages, possible security breaches, configuration and overall system effectiveness. Often, the entire electronic business of the organization is at stake, and even with the most reliable system of protection, a one-hundred-per cent guarantee of invulnerability of internal company data will not be given in principle. Depending on the goals pursued by the software lure, it can have various configuration parameters, ranging from software levels that do not require large settings and ending with complex hardware complexes. Depending on the level of complexity of the bait and its capabilities, they can be classified into three groups: weak, medium, and strong levels of interaction. In addition to the purely practical application of Honeypot, described above, no less important is the other side of the issue - research. Unfortunately, one of the most pressing problems for security professionals is the lack of information. Who threatens, why they attack, how and by what means they use - these questions very often do not have a clear answer. Informed means are armed, but in the world of security such information is not enough - there are no data sources. This is a very rare scenario, as no one can even theoretically allow the possibility of using a trap as a starting point to attack other objects. If you allow Honeypot to connect to remote hosts, an attacker could attack other systems using the trap's IP address as the source of the attack, which would cause serious legal issues. This possibility may be prohibited or controlled, but if it is prohibited, it may seem suspicious to the attacker, and if it exists but is controlled, the attacker may assess the restrictions or prohibited requests based on the information received, conclude that the attacked object is a trap.У цій статті проаналізовано використання програмних приманок як активу захисту інформації. Проведено ретельне дослідження типів приманок, їх переваг та недоліків, можливих порушень безпеки, конфігурації та загальної ефективності системи. Часто на карту поставлений весь електронний бізнес організації, і навіть при найнадійнішій системі захисту стовідсоткова гарантія невразливості внутрішніх даних компанії не буде надана в принципі. Залежно від цілей, які переслідує програмна приманка, вона може мати різні параметри конфігурації, починаючи від програмних рівнів, які не потребують великих налаштувань, і закінчуючи складними апаратними комплексами. Залежно від рівня складності приманки та її можливостей їх можна класифікувати на три групи: слабкі, середні та сильні рівні взаємодії. Окрім суто практичного застосування Honeypot, описаного вище, не менш важливою є й інша сторона питання - дослідження. На жаль, однією з найбільш актуальних проблем професіоналів безпеки є брак інформації. Хто загрожує, чому вони атакують, як і якими засобами вони користуються - ці питання дуже часто не мають чіткої відповіді. Поінформовані засоби озброєні, але у світі безпеки такої інформації не вистачає - джерел даних немає. Це дуже рідкісний сценарій, оскільки ніхто не може навіть теоретично допустити можливість використання пастки як стартової точки для нападу на інші об'єкти. Якщо дозволено використовувати Honeypot для підключення до віддалених хостів, зловмисник зможе атакувати інші системи, використовуючи IP-адресу пастки як джерело атаки, що з юридичної точки зору спричинить серйозні проблеми. Така можливість може бути заборонена або контрольована, але якщо вона заборонена, вона може здатися зловмисникові підозрілою, а якщо вона існує, але контролюється, зловмисник може оцінити обмеження або заборонені запити на основі інформації отримавши, зробіть висновок, що об'єкт, що атакується, є пасткою

    Visualisasi Pencapaian Kinerja Akademik Dosen UIN Sunan Gunung Djati Bandung berbasis Teknologi Informasi

    Get PDF
    Mutu pendidikan merupakan suatu hal yang sangat penting, salah satu faktor yang mempengaruhi mutu pendidikan adalah pengajar. Dalam pendidikan tinggi, pengajar/dosen memegang peranan yang sangat penting dalam kualitas lulusan. Untuk meningkatkan kualitas lulusan diperlukan dosen yang berkualitas, baik dalam hal penilaian terhadap mahasiswa maupun aspek pembelajaran lainnya. Salah satu cara untuk mengetahui kualitas pengajar/dosen dalam proses belajar mengajar yaitu dengan melakukan evaluasi kinerja terhadap dosen

    Active deep learning for nonlinear optics design of a vertical FFA accelerator

    Get PDF
    Vertical Fixed-Field Alternating Gradient (vFFA) accelerators exhibit particle orbits which move vertically during acceleration. This recently rediscovered circular accelerator type has several advantages over conventional ring accelerators, such as zero momentum compaction factor. At the same time, inherently non-planar orbits and a unique transverse coupling make controlling the beam dynamics a complex task. In general, betatron tune adjustment is crucial to avoid resonances, particularly when space charge effects are present. Due to highly nonlinear magnetic fields in the vFFA, it remains a challenging task to determine an optimal lattice design in terms of maximising the dynamic aperture. This contribution describes a deep learning based algorithm which strongly improves on regular grid scans and random search to find an optimal lattice: a surrogate model is built iteratively from simulations with varying lattice parameters to predict the dynamic aperture. The training of the model follows an active learning paradigm, which thus considerably reduces the number of samples needed from the computationally expensive simulations

    Online fit of an analytical response matrix model for orbit correction and optical function measurement

    Get PDF
    At the Karlsruhe Research Accelerator (KARA), an analytical online model of the orbit response matrix (ORM) has been developed and tested. The model, called the bilinear-exponential model with dispersion (BE+d model), is derived from the Mais-Ripken formalism describing coupled betatron motion. Compared to the standard approach of measuring the ORM, this method continuously adapts to changing beam optics without a dedicated measurement. It is especially useful for storage rings without turn-by-turn capable beam position monitors (BPMs) as the online model also gives access to estimates of the coupled optical functions. In the following, experimental orbit correction results and a comparison of fitted and simulated optical functions are presented

    Split-ring resonator experiments and data analysis at FLUTE

    Get PDF
    FLUTE (Ferninfrarot Linac- Und Test-Experiment) is a compact linac-based test facility for accelerator and diagnostics R&D located at the Karlsruher Institute of Technology (KIT). A new accelerator diagnostics tool, called the split-ring resonator (SRR), was tested at FLUTE, which aims at measuring the longitudinal bunch profile of fs-scale electron bunches. Laser-generated THz radiation is used to excite a high frequency oscillating electromagnetic field in the SRR. Electrons passing through the 20 µm x 20 µm SRR gap are time-dependently deflected in the vertical plane, leading to a vertical streaking of the electron bunch. During the commissioning of the SRR at FLUTE, large series of streaking attempts with varying machine parameters and set-ups were investigated in an automatized way. The recorded beam screen images during this experiment have been analyzed and evaluated. This contribution motivates and presents the automatized experiment and discusses the data analysis

    Commissioning of a 1.6 m long 16mm period superconducting undulator at the Australian Synchrotron

    Get PDF
    A 1.6 m long 16 mm period superconducting undulator (SCU16) has been installed and commissioned at the Australian Synchrotron. The SCU16, developed by Bilfinger Noell GmbH, is based on the SCU20 currently operating at at KIT. The SCU16 is conduction cooled with a maximum on axis field of 1.084 T and a fixed effective vacuum gap of 5.5 mm. The design and performance of the longest superconducting undulator at a light source will be presented

    Characterization and optimization of laser-generated THz beam for THz based streaking

    Get PDF
    At the Ferninfrarot Linac- und Test-Experiment (FLUTE) at the Karlsruhe Institute of Technology (KIT) a new and compact method for longitudinal diagnostics of ultrashort electron bunches is being developed. For this technique, which is based on THz streaking, strong electromagnetic pulses with frequencies around 240 GHz are required. Therefore, a setup for laser-generated THz radiation using tilted-pulse-front pumping in lithium niobate was designed, delivering up to 1 µJ of THz pulse energy with a conversion efficiency of up to 0.03 %. In this contribution we study the optimization of the THz beam transport and environment

    Investigations on NbTi superconducting racetrack coils under pulsed-current excitations

    Get PDF
    One of the key issues in the technology of superconductors is the protection against quenches. When designing a superconductor as a magnet, a coil or even current leads, the design should be made such that the superconductor withstands all operational conditions as fast discharges, pulsed loads or even rapid transient background fields. Computational modeling of pulsed-current characterization in a self-field NbTi racetrack sample coil has been performed using the finite element modelling software Opera as a step towards understanding the thermal and electromagnetic processes during a quench. The pulse was modelled to be generated by discharging a capacitor into an RLC circuit, which includes the NbTi racetrack coil as the sample under test. The coil was driven to the resistive state and the quench occurred by applying the pulse with a peak value exceeding the critical current of the sample coil. This contribution presents the results obtained from investigating a pulsed NbTi coil in a model based on an electromagnetic analysis. In addition, a comparison to the theoretical expectations derived for the damped oscillations in the pulse-driving circuit is given. Finally, the results from a coupled analysis, where both thermal and electromagnetic properties are being considered, within a quench multi-physics study are presented

    A low-latency feedback system for the control of horizontal betatron oscillations

    Get PDF
    Reinforcement learning (RL) algorithms are investigated at KIT as an option to control the beam dynamics at storage rings. These methods require specialized hardware to satisfy throughput and latency constraints dictated by the timescale of the relevant phenomena. The KINGFISHER platform, based on the novel Xilinx Versal Adaptive Compute and Acceleration Platform, is an ideal candidate to deploy RL-on-a-chip thanks to its ability to execute computationally intensive and low latency feedback loops in the order of tens of microseconds. In this publication, we will present the integration of the KINGFISHER system at the Karlsruhe Research Accelerator (KARA), as a proof-of-principle turn-by-turn control feedback loop, to control induced transversal oscillations of an electron beam

    Electron beam test facilities for novel applications

    Get PDF
    Delivering and tailoring high brightness electron beams for a wide range of novel applications is a challenging task in single pass accelerator test facilities. This paper will review beam dynamics challenges at single pass accelerator test facilities in Europe to generate, transport and tailor low- to medium-energy high brightness electron beams for a range of novel applications
    corecore