24 research outputs found

    Environmental security in P2P networks

    Get PDF
    Abstract-The great impact and growth of P2P networks in recent years make them an interesting target for hackers. But the development of P2P is aimed at improving the behavior of the networks, in computational terms, or to hide the transactions from observers. Security in P2P networks has been usually undervalued and not taken into account. This paper tries to highlight the major topics and challenges regarding P2P security, from a network infrastructure point of view (environmental security), providing some insights in current developments and available techniques that could be used to solve those problems

    Anomaly-based network intrusion detection: Techniques, systems and challenges.

    Get PDF
    Threat Intrusion detection Anomaly detection IDS systems and platforms Assessment a b s t r a c t The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this context, anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities. However, despite the variety of such methods described in the literature in recent years, security tools incorporating anomaly detection functionalities are just starting to appear, and several important problems remain to be solved. This paper begins with a review of the most well-known anomaly-based intrusion detection techniques. Then, available platforms, systems under development and research projects in the area are presented. Finally, we outline the main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues. ª 2008 Elsevier Ltd. All rights reserved. Introduction Intrusion Detection Systems (IDS) are security tools that, like other measures such as antivirus software, firewalls and access control schemes, are intended to strengthen the security of information and communication systems. Although, as shown i

    BOOTES-IR: Near IR follow-up GRB observations by a robotic system

    Get PDF
    “BOOTES-IR” is the extension of the BOOTES experiment, which operates in Southern Spain since 1998, to the near IR (NIR). The goal is to follow up the early stage of the gamma ray burst (GRB) afterglow emission in the NIR, alike BOOTES does already at optical wavelengths. The scientific case that drives the BOOTES-IR performance is the study of GRBs with the support of spacecraft like INTEGRAL, SWIFT and GLAST. Given that the afterglow emission in both, the NIR and the optical, in the instances immediately following a GRB, is extremely bright (reached V = 8.9 in one case), it should be possible to detect this prompt emission at NIR wavelengths too. The combined observations by BOOTES-IR and BOOTES-1 and BOOTES-2 will allow for real time identification of trustworthy candidates to have a high redshift (z > 5). It is expected that, few minutes after a GRB, the IR magnitudes be H ∼ 7–10, hence very high quality spectra can be obtained for objects as far as z = 10 by larger instruments

    Remote ischemic preconditioning ameliorates anthracycline-induced cardiotoxicity and preserves mitochondrial integrity

    Get PDF
    Aims: Anthracycline-induced cardiotoxicity (AIC) is a serious adverse effect among cancer patients. A central mechanism of AIC is irreversible mitochondrial damage. Despite major efforts, there are currently no effective therapies able to prevent AIC. Methods and results: Forty Large-White pigs were included. In Study 1, 20 pigs were randomized 1:1 to remote ischaemic preconditioning (RIPC, 3 cycles of 5 min leg ischaemia followed by 5 min reperfusion) or no pretreatment. RIPC was performed immediately before each intracoronary doxorubicin injections (0.45 mg/kg) given at Weeks 0, 2, 4, 6, and 8. A group of 10 pigs with no exposure to doxorubicin served as healthy controls. Pigs underwent serial cardiac magnetic resonance (CMR) exams at baseline and at Weeks 6, 8, 12, and 16, being sacrifice after that. In Study 2, 10 new pigs received 3 doxorubicin injections (with/out preceding RIPC) and were sacrificed at week 6. In Study 1, left ventricular ejection fraction (LVEF) depression was blunted animals receiving RIPC before doxorubicin (RIPC-Doxo), which had a significantly higher LVEF at Week 16 than doxorubicin treated pigs that received no pretreatment (Untreated-Doxo) (41.5 ± 9.1% vs. 32.5 ± 8.7%, P = 0.04). It was mainly due to conserved regional contractile function. In Study 2, transmission electron microscopy (TEM) at Week 6 showed fragmented mitochondria with severe morphological abnormalities in Untreated-Doxo pigs, together with upregulation of fission and autophagy proteins. At the end of the 16-week Study 1 protocol, TEM revealed overt mitochondrial fragmentation with structural fragmentation in Untreated-Doxo pigs, whereas interstitial fibrosis was less severe in RIPC+Doxo pigs. Conclusion: In a translatable large-animal model of AIC, RIPC applied immediately before each doxorubicin injection resulted in preserved cardiac contractility with significantly higher long-term LVEF and less cardiac fibrosis. RIPC prevented mitochondrial fragmentation and dysregulated autophagy from AIC early stages. RIPC is a promising intervention for testing in clinical trials in AIC.Fil: Galán Arriola, Carlos. Centro de Investigacion Biomedica En Red.; EspañaFil: Villena Gutiérrez, Rocio. Centro de Investigacion Biomedica En Red.; EspañaFil: Higuero Verdejo, María I.. Centro Nacional de Investigaciones Cardiovasculares; EspañaFil: Díaz Rengifo, Iván A.. Centro Nacional de Investigaciones Cardiovasculares; EspañaFil: Pizarro, Gonzalo. Centro de Investigacion Biomedica En Red.; EspañaFil: López, Gonzalo J.. Centro Nacional de Investigaciones Cardiovasculares; EspañaFil: de Molina Iracheta, Antonio. Centro Nacional de Investigaciones Cardiovasculares; EspañaFil: Pérez Martínez, Claudia. Universidad de Leon. Facultad de Veterinaria; ArgentinaFil: García, Rodrigo Damián. Consejo Nacional de Investigaciones Científicas y Técnicas. Centro Científico Tecnológico Conicet - Mendoza. Instituto de Medicina y Biología Experimental de Cuyo; ArgentinaFil: González Calle, David. Centro de Investigacion Biomedica En Red.; EspañaFil: Lobo, Manuel. Centro de Investigacion Biomedica En Red.; EspañaFil: Sánchez, Pedro L.. Centro de Investigacion Biomedica En Red.; EspañaFil: Oliver, Eduardo. Centro de Investigacion Biomedica En Red.; EspañaFil: Córdoba, Raúl. Hospital Fundacion Jimenez Diaz; EspañaFil: Fuster, Valentin. Centro Nacional de Investigaciones Cardiovasculares; EspañaFil: Sánchez González, Javier. No especifíca;Fil: Ibanez, Borja. Centro de Investigacion Biomedica En Red.; Españ

    Musical Style Recognition by Detection of Compass

    No full text
    Abstract. The present paper describes a method for the automatic classification of musical styles from the musical signal. This method can be used for searching and indexing purposes in musical databases, which constitutes one of the applications of MPEG-7. The method is based on applying HMM models to detect the compass in a way very similar to what is done for continuous speech recognition. The experiments demonstrate the kindness of the HMMs applied to the recognition of musical styles

    09 Sobre las capacidades de detecci´on de los IDS basados en firmas

    No full text
    Los sistemas de detección de intrusiones (IDS) pueden detectar actividades maliciosas y generar alertas a supervisar, por lo que constituyen el núcleo de los sistemas de monitorización de la seguridad de las redes. Tradicionalmente, se ha asumido que los IDS basados en firmas (SIDS) ofrecen una capacidad de detección y tasa de falsos positivos adecuadas, presentando limitaciones solo en la detección de ataques 0-day. Sin embargo, estas capacidades están inequívocamente asociadas a la calidad de las firmas disponibles, que varían no sólo en el tiempo sino con la herramienta concreta utilizada. En este trabajo se exploran las capacidades de diversos sistemas SIDS ampliamente utilizados en un escenario real en el contexto de servicios web. Asimismo, se analiza la evolución de sus prestaciones a lo largo del tiempo considerando la actualización de las firmas. Los resultados de nuestras pruebas evidencian una gran variabilidad en las prestaciones en función de la herramienta seleccionada, así como una deficiente cobertura de ataques conocidos, incluso cuando se optimizan las reglas para ajustarse al sistema a proteger. Consecuentemente, es necesario revisar el papel de los SIDS como elementos de protección, ya que pueden proporcionar una falsa sensación de seguridad

    Validación de un sistema de diálogo mediante el uso de diferentes umbrales de poda en el proceso de reconocimiento automático de voz

    No full text
    This paper presents a new technique to validate the performance of dialogue systems focusing on two measures: response time a sentence understanding. Initially, the paper presents a description of the input interface of the dialogue system used in the experiments, including a classification of the recognition tasks considered. Later, it presents the basic features of the proposed technique and describes how the technique has been applied to validate the performance of the dialogue system. Later the paper presents the experimental results which, on the one hand, show that six out of the nine recognition tasks employed by the system can be considered validated, since the imposed restrictions on recognition time and sentence understanding are kept. On the other hand, the results show that for improving the system it is necessary to change the strategies used for the remainder three tasks. Finally, the paper shows some possibilities for future work related to the new strategies employable to enhance the performance of the dialogue system.Este artículo presenta una nueva metodología cuyo objetivo es validar el funcionamiento de los sistemas de diálogo centrándose en dos aspectos: tiempo de respuesta y porcentaje de comprensión de frases. En primer lugar, el artículo realiza una descripción de la interfaz de entrada del sistema de diálogo usado en los experimentos, incluyendo una clasificación de las tareas de reconocimiento consideradas. A continuación, presenta los fundamentos de la técnica propuesta y muestra una aplicación de la misma para validar el funcionamiento del sistema de diálogo. Seguidamente muestra los resultados experimentales, los cuales indican, por una parte, que seis de las nueve tareas de reconocimiento diseñadas pueden ser consideradas válidas, pues se cumplen los requisitos impuestos respecto a tiempo de reconocimiento y porcentaje de comprensión de frases. Por otra parte, los resultados indican que para validar el funcionamiento del sistema es necesario cambiar las estrategias empleadas en las tres tareas restantes. Finalmente, el artículo muestra algunas líneas de trabajo futuro, encaminadas a utilizar nuevas estrategias para mejorar el funcionamiento del sistema de diálogo
    corecore