111 research outputs found

    Network communication privacy: traffic masking against traffic analysis

    Get PDF
    An increasing number of recent experimental works have been demonstrating the supposedly secure channels in the Internet are prone to privacy breaking under many respects, due to traffic features leaking information on the user activity and traffic content. As a matter of example, traffic flow classification at application level, web page identification, language/phrase detection in VoIP communications have all been successfully demonstrated against encrypted channels. In this thesis I aim at understanding if and how complex it is to obfuscate the information leaked by traffic features, namely packet lengths, direction, times. I define a security model that points out what the ideal target of masking is, and then define the optimized and practically implementable masking algorithms, yielding a trade-off between privacy and overhead/complexity of the masking algorithm. Numerical results are based on measured Internet traffic traces. Major findings are that: i) optimized full masking achieves similar overhead values with padding only and in case fragmentation is allowed; ii) if practical realizability is accounted for, optimized statistical masking algorithms attain only moderately better overhead than simple fixed pattern masking algorithms, while still leaking correlation information that can be exploited by the adversary

    Global Warming Estimation from MSU

    Get PDF
    In this study, we have developed time series of global temperature from 1980-97 based on the Microwave Sounding Unit (MSU) Ch 2 (53.74 GHz) observations taken from polar-orbiting NOAA operational satellites. In order to create these time series, systematic errors (approx. 0.1 K) in the Ch 2 data arising from inter-satellite differences are removed objectively. On the other hand, smaller systematic errors (approx. 0.03 K) in the data due to orbital drift of each satellite cannot be removed objectively. Such errors are expected to remain in the time series and leave an uncertainty in the inferred global temperature trend. With the help of a statistical method, the error in the MSU inferred global temperature trend resulting from orbital drifts and residual inter-satellite differences of all satellites is estimated to be 0.06 K decade. Incorporating this error, our analysis shows that the global temperature increased at a rate of 0.13 +/- 0.06 K decade during 1980-97

    Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

    Full text link
    Mouse dynamics is a potential means of authenticating users. Typically, the authentication process is based on classical machine learning techniques, but recently, deep learning techniques have been introduced for this purpose. Although prior research has demonstrated how machine learning and deep learning algorithms can be bypassed by carefully crafted adversarial samples, there has been very little research performed on the topic of behavioural biometrics in the adversarial domain. In an attempt to address this gap, we built a set of attacks, which are applications of several generative approaches, to construct adversarial mouse trajectories that bypass authentication models. These generated mouse sequences will serve as the adversarial samples in the context of our experiments. We also present an analysis of the attack approaches we explored, explaining their limitations. In contrast to previous work, we consider the attacks in a more realistic and challenging setting in which an attacker has access to recorded user data but does not have access to the authentication model or its outputs. We explore three different attack strategies: 1) statistics-based, 2) imitation-based, and 3) surrogate-based; we show that they are able to evade the functionality of the authentication models, thereby impacting their robustness adversely. We show that imitation-based attacks often perform better than surrogate-based attacks, unless, however, the attacker can guess the architecture of the authentication model. In such cases, we propose a potential detection mechanism against surrogate-based attacks.Comment: Accepted in 2019 International Joint Conference on Neural Networks (IJCNN). Update of DO

    Enrique CAMARA DE LANDA : Etnomusicologia

    Get PDF
    On aurait pu penser qu’avec le livre Etnomusicología, publié en Espagne en 2003, nous avions désormais un manuel complet d’introduction à l’ethnomusicologie touchant les aspects majeurs de la discipline (histoire, méthodes, terrains, champs d’investigations, problématiques, analyses, méthodes). Parue en 2014, cette nouvelle édition italienne, augmentée et enrichie de chapitres inédits offre pourtant de substantielles améliorations et de précieux compléments. Etnomusicologia – titre italien de..

    Rain retrieval method for mesoscale convective systems

    Get PDF
    The analysis of recent high-resolution aircraft observations over the ocean made by radar and passive microwave radiometer reveals significant problems in relating the brightness temperature measurements of the radiometer with the radar-derived rain rates. A predominant cause of this problem is that the information on rain drops contained in the radiometric measurements is contaminated by scattering and emission from other hydrometeors present in the field of view (fov) of the radiometer. Extensive observations of rain rate made by ship-borne radars and by the multichannel Special Sensor Microwave Imager (SSM/I), with a much larger fov, lead to similar conclusions. Considering the variability in the meteorological conditions, and in the hydrometeors spatial distribution, we developed an empirical method to estimate rain rate based on two parameters derived from the SSM/I data, which are related to the convective dynamics. The calibration of this empirical algorithm was performed with radar ground truth for November 1992, available over the TOGA-COARE (Tropical Ocean Global Atmosphere-Coupled Ocean Atmosphere Response Experiment) region. Then the algorithm was applied to the same TOGA-COARE region for the remaining three months available. The comparison between the estimated rain rate and the radar observations gives a correlation coefficient of about 0.85, and the monthly total estimated rainfall has an error of about 13%. This rain retrieval method, tuned for Mesoscale Convective Systems (MCSs), is applicable to the Tropical Rain Measuring Mission (TRMM), where microwave radiometric observations and simultaneous radar observations are available

    Real Time Identification of SSH Encrypted Application Flows by Using Cluster Analysis Techniques

    Get PDF
    Abstract. The identification of application flows is a critical task in order to manage bandwidth requirements of different kind of services (i.e. VOIP, Video, ERP). As network security functions spread, an increasing amount of traffic is natively encrypted due to privacy issues (e.g. VPN). This makes ineffective current traffic classification systems based on ports and payload inspection, e.g. even powerful Deep Packet Inspection is useless to classify application flow carried inside SSH sessions. We have developed a real time traffic classification method based on cluster analysis to identify SSH flows from statistical behavior of IP traffic parameters, such as length, arrival times and direction of packets. In this paper we describe our approach and relevant obtained results. We achieve detection rate up to 99.5 % in classifying SSH flows and accuracy up to 99.88 % for application flows carried within those flows, such as SCP, SFTP and HTTP over SSH

    Imported Chikungunya Infection, Italy

    Get PDF
    From July to September 2006, a total of 17 confirmed cases of CHIKV infection were observed in travelers at 5 Gruppo di Interesse e Studio delle Patologie di Importazione (GISPI) centers (Italian network of Institutes of Infectious and Tropical Diseases). Prompt reporting of imported CHIKV infections is essential for monitoring of potential risk. The possibility of introducing CHIKV into Italy cannot be ruled out on the basis of current evidence
    corecore