45,889 research outputs found

    Network traffic analysis for threats detection in the Internet of Things

    Get PDF
    As the prevalence of the Internet of Things (IoT) continues to increase, cyber criminals are quick to exploit the security gaps that many devices are inherently designed with. Users cannot be expected to tackle this threat alone, and many current solutions available for network monitoring are simply not accessible or can be difficult to implement for the average user, which is a gap that needs to be addressed. This article presents an effective signature-based solution to monitor, analyze, and detect potentially malicious traffic for IoT ecosystems in the typical home network environment by utilizing passive network sniffing techniques and a cloud application to monitor anomalous activity. The proposed solution focuses on two attack and propagation vectors leveraged by the infamous Mirai botnet, namely DNS and Telnet. Experimental evaluation demonstrates the proposed solution can detect 98.35 percent of malicious DNS traffic and 99.33 percent of Telnet traffic for an overall detection accuracy of 98.84 percent

    Azumaya Objects in Triangulated Bicategories

    Full text link
    We introduce the notion of Azumaya object in general homotopy-theoretic settings. We give a self-contained account of Azumaya objects and Brauer groups in bicategorical contexts, generalizing the Brauer group of a commutative ring. We go on to describe triangulated bicategories and prove a characterization theorem for Azumaya objects therein. This theory applies to give a homotopical Brauer group for derived categories of rings and ring spectra. We show that the homotopical Brauer group of an Eilenberg-Mac Lane spectrum is isomorphic to the homotopical Brauer group of its underlying commutative ring. We also discuss tilting theory as an application of invertibility in triangulated bicategories.Comment: 23 pages; final version; to appear in Journal of Homotopy and Related Structure

    Plunge waveforms from inspiralling binary black holes

    Get PDF
    We study the coalescence of non-spinning binary black holes from near the innermost stable circular orbit down to the final single rotating black hole. We use a technique that combines the full numerical approach to solve Einstein equations, applied in the truly non-linear regime, and linearized perturbation theory around the final distorted single black hole at later times. We compute the plunge waveforms which present a non negligible signal lasting for t100Mt\sim 100M showing early non-linear ringing, and we obtain estimates for the total gravitational energy and angular momentum radiated.Comment: Corrected typos in the radiated ang momentum and frequenc

    Gauge conditions for binary black hole puncture data based on an approximate helical Killing vector

    Full text link
    We show that puncture data for quasicircular binary black hole orbits allow a special gauge choice that realizes some of the necessary conditions for the existence of an approximate helical Killing vector field. Introducing free parameters for the lapse at the punctures we can satisfy the condition that the Komar and ADM mass agree at spatial infinity. Several other conditions for an approximate Killing vector are then automatically satisfied, and the 3-metric evolves on a timescale smaller than the orbital timescale. The time derivative of the extrinsic curvature however remains significant. Nevertheless, quasicircular puncture data are not as far from possessing a helical Killing vector as one might have expected.Comment: 11 pages, 6 figures, 2 table

    Quasars in the 2MASS Second Incremental Data Release

    Full text link
    Using the 2MASS Second Incremental Data Release, we have searched for near infrared counterparts to 13214 quasars from the Veron-Cetty & Veron(2000) catalog. We have detected counterparts within 4 arcsec for 2277 of the approximately 6320 quasars within the area covered by the 2MASS Second Incremental Data Release. Only 1.6% of these are expected to be chance coincidences. Though this sample is heterogeneous, we find that known radio-loud quasars are more likely to have large near-infrared-to-optical luminosity ratios than radio-quiet quasars are, at a statistically significant level. This is consistent with dust-reddened quasars being more common in radio-selected samples than in optically-selected samples, due to stronger selection effects against dust-reddened quasars in the latter. We also find a statistically significant dearth of optically luminous quasars with large near-infrared-to-optical luminosity ratios. This can be explained in a dust obscuration model but not in a model where synchrotron emission extends from the radio into the near-infrared and creates such large ratios. We also find that selection of quasar candidates from the B-J/J-K color-color diagram, modelled on the V-J/J-K selection method of Warren, Hewett & Foltz (2000), is likely to be more sensitive to dust-obscured quasars than selection using only infrared-infrared colors.Comment: To be published in May issue of Astronomical Journal (26 pages, 8 figures, 2 tables) Replaced Figure 6 and

    Confinement: Understanding the Relation Between the Wilson Loop and Dual Theories of Long Distance Yang Mills Theory

    Get PDF
    In this paper we express the velocity dependent, spin dependent heavy quark potential VqqˉV_{q\bar q} in QCD in terms of a Wilson Loop W(Γ)W(\Gamma) determined by pure Yang Mills theory. We use an effective dual theory of long-distance Yang Mills theory to calculate W(Γ)W(\Gamma) for large loops; i.e. for loops of size R>RFTR > R_{FT}. (RFTR_{FT} is the flux tube radius, fixed by the value of the Higgs (monopole) mass of the dual theory, which is a concrete realization of the Mandelstam 't Hooft dual superconductor mechanism of confinement). We replace W(Γ)W(\Gamma) by Weff(Γ)W_{eff}(\Gamma), given by a functional integral over the dual variables, which for R>RFTR > R_{FT} can be evaluated by a semiclassical expansion, since the dual theory is weakly coupled at these distances. The classical approximation gives the leading contribution to Weff(Γ)W_{eff}(\Gamma) and yields a velocity dependent heavy quark potential which for large RR becomes linear in RR, and which for small RR approaches lowest order perturbative QCD. This latter fact means that these results should remain applicable down to distances where radiative corrections giving rise to a running coupling constant become important. The spin dependence of the potential reflects the vector coupling of the quarks at long range as well as at short range. The methods developed here should be applicable to any realization of the dual superconductor mechanism. They give an expression determining Weff(Γ)W_{eff}(\Gamma) independent of the classical approximation, but semi classical corrections due to fluctuations of the flux tube are not worked out in this paper. Taking these into account should lead to an effective string theory free from the conformal anomaly.Comment: 39 pages, latex2e, 1 figure(fig.eps

    Recognizing hyperelliptic graphs in polynomial time

    Get PDF
    Recently, a new set of multigraph parameters was defined, called "gonalities". Gonality bears some similarity to treewidth, and is a relevant graph parameter for problems in number theory and multigraph algorithms. Multigraphs of gonality 1 are trees. We consider so-called "hyperelliptic graphs" (multigraphs of gonality 2) and provide a safe and complete sets of reduction rules for such multigraphs, showing that for three of the flavors of gonality, we can recognize hyperelliptic graphs in O(n log n+m) time, where n is the number of vertices and m the number of edges of the multigraph.Comment: 33 pages, 8 figure

    Method of extending hyperfine coherence times in Pr^3+:Y_2SiO_5

    Full text link
    In this letter we present a method for increasing the coherence time of praseodymium hyperfine ground state transitions in Pr^3+:Y_2SiO_5 by the application of a specific external magnetic field. The magnitude and angle of the external field is applied such that the Zeeman splitting of a hyperfine transition is at a critical point in three dimensions, making the first order Zeeman shift vanishingly small for the transition. This reduces the influence of the magnetic interactions between the praseodymium ions and the spins in the host lattice on the transition frequency. Using this method a phase memory time of 82ms was observed, a value two orders of magnitude greater than previously reported. It is shown that the residual dephasing is amenable quantum error correction

    Disorder induced Dirac-point physics in epitaxial graphene from temperature-dependent magneto-transport measurements

    Get PDF
    We report a study of disorder effects on epitaxial graphene in the vicinity of the Dirac point by magneto-transport. Hall effect measurements show that the carrier density increases quadratically with temperature, in good agreement with theoretical predictions which take into account intrinsic thermal excitation combined with electron-hole puddles induced by charged impurities. We deduce disorder strengths in the range 10.2 \sim 31.2 meV, depending on the sample treatment. We investigate the scattering mechanisms and estimate the impurity density to be 3.09.1×10103.0 \sim 9.1 \times 10^{10} cm2^{-2} for our samples. An asymmetry in the electron/hole scattering is observed and is consistent with theoretical calculations for graphene on SiC substrates. We also show that the minimum conductivity increases with increasing disorder potential, in good agreement with quantum-mechanical numerical calculations.Comment: 6 pages, 3 figure

    A How-To for the Mock LISA Data Challenges

    Get PDF
    The LISA International Science Team Working Group on Data Analysis (LIST-WG1B) is sponsoring several rounds of mock data challenges, with the purpose of fostering development of LISA data-analysis capabilities, and of demonstrating technical readiness for the maximum science exploitation of the LISA data. The first round of challenge data sets were released at this Symposium. We describe the models and conventions (for LISA and for gravitational-wave sources) used to prepare the data sets, the file format used to encode them, and the tools and resources available to support challenge participants.Comment: 10 pages, 1 figure, in Proceedings of the Sixth International LISA Symposium (AIP, 2006
    corecore