66 research outputs found

    Research on heteregeneous data for recognizing threat

    Get PDF
    The information increasingly large of volume dataset and multidimensional data has grown rapidly in recent years. Inter-related and update information from security communities or vendor network security has present of content vulnerability and patching bug from new attack (pattern) methods. It given a collection of datasets, we were asked to examine a sample of such data and look for pattern which may exist between certain pattern methods over time. There are several challenges, including handling dynamic data, sparse data, incomplete data, uncertain data, and semistructured/unstructured data. In this paper, we are addressing these challenges and using data mining approach to collecting scattered information in routine update regularly from provider or security community

    Attack and Vulnerability Penetration Testing: FreeBSD

    Get PDF
     Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks

    Text localization in images using reverse thresholds algorithm

    Get PDF
    High color similarity between text pixels and background pixels is the major problem that causes failure during text localization. In this paper, a novel algorithm, Reverse Thresholds (RT) algorithm is proposed to localize text from the images with various text-background color similarities. First, a rough calculation is proposed to determine the similarity index for every text region. Then, by applying reverse operation, the best thresholds for each text region are calculated by its similarity index. To remove other uncertainties, self-generated images with the same text features but different similarity index are used as experiment dataset. Experiment result shows that RT algorithm has higher localizing strength which is able to localize text in a wider range of similarity index

    Active Sampling Procedure of Indoor Air Quality to Evaluate Airborne Fungi in Dental Building of Higher Education Institution

    Get PDF
    The study aimed to measure the concentration and composition of airborne fungi in a higher education institution. The temperature and relative humidity were recorded using TSI Q Trak Indoor Air Quality Monitor. The mean concentration of the indoor air fungi was in the range between 17.67–91.28 CFU/m³. The most abundant airborne fungi were Aspergillus (22%), Fusarium (17%), and Penicillium (15%). The highest mean range concentration of airborne fungi was in the evening followed by in the afternoon and in the morning with a value range between 74 to 148 CFU/m³, 18 to 148 CFU/m³, and 5 to 30 CFU/m³, respectively. Keywords: active sampling; airborne fungi; indoor air quality; dental building. eISSN: 2398-4287© 2021. The Authors. Published for AMER ABRA cE-Bs by e-International Publishing House, Ltd., UK. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer–review under responsibility of AMER (Association of Malaysian Environment-Behaviour Researchers), ABRA (Association of Behavioural Researchers on Asians/Africans/Arabians) and cE-Bs (Centre for Environment-Behaviour Studies), Faculty of Architecture, Planning & Surveying, Universiti Teknologi MARA, Malaysia. DOI: https://doi.org/10.21834/ebpj.v6iSI4.291

    Penetration testing and mitigation of vulnerabilities windows server

    Get PDF
    Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools-both simple and comprehensive-are themselves evolving rapidly. Certain approaches are necessary to protect a system from cyber threats. This work engages with comprehensive penetration testing in order to find vulnerabilities in the Windows Server and exploit them. Some forms of method penetration testing have been used in this experiment, including reconnaissance probes, brute force attacks based on password guessing, implanting malware to create a backdoorfor escalating privileges, and flooding the target. This experiment was focused on gaining access in order to ascertainthe identities of hackers and thus better understand their methods and performed penetration testing to evaluate security flaws in the Windows Server, which is a famous OS for web applications. It is expected that this work will serve as aguideline for practitioners who want to prepare and protect their systems before putting them onlin

    Cyber-Attack Penetration Test and Vulnerability Analysis

    Get PDF
    Hacking attempts or cyber-attacks to information systems have recently evolved to be sophisticated and deadly, resulting in such incidents as leakage of personal information and system destruction. While various security solutions to cope with these risks are being developed and deployed, it is still necessary to systematically consider the methods to enhance the existing security system and build more effective defense systems. Under this circumstance, it is necessary to identify the latest types of attacks attempted to the primary security system. This paper analyzes cyber attack techniques as well as the anatomy of penetration test in order to assist security officers to perform appropriate self security assesment on their network systems

    E-learning for research capacity strengthening in sexual and reproductive health: the experience of the Geneva Foundation for Medical Education and Research and the Department of Reproductive Health and Research, World Health Organization

    Get PDF
    Abstract: Technological advancement has resulted in the increasing use of e-learning and online education, initially in high-income countries and increasingly in low- and middle-income countries. Background: In 2010, the Geneva Foundation for Medical Education and Research, in collaboration with the World Health Organization and partner institutions, developed an online postgraduate course “From Research to Practice: Training Course in Sexual and Reproductive Health Research”. This course takes advantage of the advancing Internet technology to provide training opportunities to health professionals mostly from low- and middle-income countries whose access to quality education is constrained by time, financial resources, or both. Case presentation: To assess the outcomes of the course, an evaluation was conducted by sending a self-administered questionnaire to graduates of the 2010–2012 programme. The objectives were to determine if the graduates had applied the knowledge gained from the course to their work and whether they had implemented their research project developed during the course. The evaluation also appraised the number of graduates who participated in the design or implementation of a new research project since the course concluded and whether the course had contributed to advancement in their careers. A total of 175 of 219 course graduates answered the questionnaire. The evaluation revealed that the majority of respondents (98%) had utilized the knowledge acquired, with nearly half of them (47%) having published a scientific paper as author or co-author. About a third of respondents (39%) had implemented their course research project and about three quarters of them (74%) have been involved in the design or implementation of a research project after completing the course. Over three quarters (81%) of respondents opined that the course had contributed to their career advancement and almost half of them (46%) had a career promotion as a direct or indirect benefit of the course. Conclusion: We surmise that the course positively impacted the participants’ knowledge and understanding of sexual and reproductive health, which they applied in their professional work, as well as strengthened their research capacity. Success factors for the e-learning programme include tailor-made content to meet participants’ needs, flexibility of access, and ongoing engagement/personal interactivity with course coaches

    Clinical and molecular epidemiology of Crimean-Congo hemorrhagic fever in Oman

    Get PDF
    BackgroundCrimean-Congo hemorrhagic fever (CCHF) is a serious disease with a high fatality rate reported in many countries. The first case of CCHF in Oman was detected in 1995 and serosurveys have suggested widespread infection of humans and livestock throughout the country.MethodologyCases of CCHF reported to the Ministry of Health (MoH) of Oman between 1995 and 2017 were retrospectively reviewed. Diagnosis was confirmed by serology and/or molecular tests in Oman. Stored RNA from recent cases was studied by sequencing the complete open reading frame (ORF) of the viral S segment at Public Health England, enabling phylogenetic comparisons to be made with other S segments of strains obtained from the region.FindingsOf 88 cases of CCHF, 4 were sporadic in 1995 and 1996, then none were detected until 2011. From 2011-2017, incidence has steadily increased and 19 (23.8%) of 80 cases clustered around Eid Al Adha. The median (range) age was 33 (15-68) years and 79 (90%) were male. The major risk for infection was contact with animals and/or butchering in 73/88 (83%) and only one case was related to tick bites alone. Severe cases were over-represented: 64 (72.7%) had a platelet count ConclusionsCCHF is well-established throughout Oman, with a single strain of virus present for at least 20 years. Most patients are men involved in animal husbandry and butchery. The high mortality suggests that there is substantial under-diagnosis of milder cases. Preventive measures have been introduced to reduce risks of transmission to animal handlers and butchers and to maintain safety in healthcare settings

    Antimicrobial resistance among migrants in Europe: a systematic review and meta-analysis

    Get PDF
    BACKGROUND: Rates of antimicrobial resistance (AMR) are rising globally and there is concern that increased migration is contributing to the burden of antibiotic resistance in Europe. However, the effect of migration on the burden of AMR in Europe has not yet been comprehensively examined. Therefore, we did a systematic review and meta-analysis to identify and synthesise data for AMR carriage or infection in migrants to Europe to examine differences in patterns of AMR across migrant groups and in different settings. METHODS: For this systematic review and meta-analysis, we searched MEDLINE, Embase, PubMed, and Scopus with no language restrictions from Jan 1, 2000, to Jan 18, 2017, for primary data from observational studies reporting antibacterial resistance in common bacterial pathogens among migrants to 21 European Union-15 and European Economic Area countries. To be eligible for inclusion, studies had to report data on carriage or infection with laboratory-confirmed antibiotic-resistant organisms in migrant populations. We extracted data from eligible studies and assessed quality using piloted, standardised forms. We did not examine drug resistance in tuberculosis and excluded articles solely reporting on this parameter. We also excluded articles in which migrant status was determined by ethnicity, country of birth of participants' parents, or was not defined, and articles in which data were not disaggregated by migrant status. Outcomes were carriage of or infection with antibiotic-resistant organisms. We used random-effects models to calculate the pooled prevalence of each outcome. The study protocol is registered with PROSPERO, number CRD42016043681. FINDINGS: We identified 2274 articles, of which 23 observational studies reporting on antibiotic resistance in 2319 migrants were included. The pooled prevalence of any AMR carriage or AMR infection in migrants was 25·4% (95% CI 19·1-31·8; I2 =98%), including meticillin-resistant Staphylococcus aureus (7·8%, 4·8-10·7; I2 =92%) and antibiotic-resistant Gram-negative bacteria (27·2%, 17·6-36·8; I2 =94%). The pooled prevalence of any AMR carriage or infection was higher in refugees and asylum seekers (33·0%, 18·3-47·6; I2 =98%) than in other migrant groups (6·6%, 1·8-11·3; I2 =92%). The pooled prevalence of antibiotic-resistant organisms was slightly higher in high-migrant community settings (33·1%, 11·1-55·1; I2 =96%) than in migrants in hospitals (24·3%, 16·1-32·6; I2 =98%). We did not find evidence of high rates of transmission of AMR from migrant to host populations. INTERPRETATION: Migrants are exposed to conditions favouring the emergence of drug resistance during transit and in host countries in Europe. Increased antibiotic resistance among refugees and asylum seekers and in high-migrant community settings (such as refugee camps and detention facilities) highlights the need for improved living conditions, access to health care, and initiatives to facilitate detection of and appropriate high-quality treatment for antibiotic-resistant infections during transit and in host countries. Protocols for the prevention and control of infection and for antibiotic surveillance need to be integrated in all aspects of health care, which should be accessible for all migrant groups, and should target determinants of AMR before, during, and after migration. FUNDING: UK National Institute for Health Research Imperial Biomedical Research Centre, Imperial College Healthcare Charity, the Wellcome Trust, and UK National Institute for Health Research Health Protection Research Unit in Healthcare-associated Infections and Antimictobial Resistance at Imperial College London
    corecore