38 research outputs found
Bydgoszcz segetal flora changes and state
Wydano przy pomocy finansowej Uniwersytetu Łódzkiego oraz Komitetu Badań NaukowychThe state and changes of Bydgoszcz segetal flora are described
in the present paper. The segetal flora of the town comprises 242 species. 31 of
these species are on the list of threatened weeds.Zadanie pt. Digitalizacja i udostępnienie w Cyfrowym Repozytorium Uniwersytetu Łódzkiego kolekcji czasopism naukowych wydawanych przez Uniwersytet Łódzki nr 885/P-DUN/2014 zostało dofinansowane ze środków MNiSW w ramach działalności upowszechniającej naukę
Security Reputation Metrics
Security reputation metrics (aka. security metrics) quantify the security
levels of organization (e.g., hosting or Internet access providers) relative to
comparable entities. They enable benchmarking and are essential tools for
decision and policy-making in security, and may be used to govern and steer
responsible parties towards investing in security when economic or other
decision-making factors may drive them to do otherwise
Urban greenery aphids (Hemiptera, Aphididae)
In 2010-2011, a study of the occurrence of aphids was carried out in three parks in Bydgoszcz, the Balaton Park, the Jan Kochanowski Park and the Park by Unii Lubelskiej. Observations were made every ten days by monitoring trees and shrubs as soon as aphids appeared, i.e. from the end of April to the beginning of August. The counts of aphids were replicated three times, on each plant species where the insects were observed. Based on the collected material, 14 aphid species were found on 16 plant species in the Jan Kochanowski Park, 16 species of aphids on 14 plant species in the Balaton Park and in the Park by Unii Lubelskiej, only 12 species feeding on 16 plant species. In both years of the study, of aphid species feeding on trees and shrubs, Aphis fabae, Aphis sambuci, Aphis spiraephaga and Hyalopterus pruni, occurred most frequently. The Balaton Park was characterized by the largest number of aphids colonizing plants; in contrast, the number of tree and bush species on which they fed was the lowest
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting
Hosting providers play a key role in fighting web compromise, but their
ability to prevent abuse is constrained by the security practices of their own
customers. {\em Shared} hosting, offers a unique perspective since customers
operate under restricted privileges and providers retain more control over
configurations. We present the first empirical analysis of the distribution of
web security features and software patching practices in shared hosting
providers, the influence of providers on these security practices, and their
impact on web compromise rates. We construct provider-level features on the
global market for shared hosting -- containing 1,259 providers -- by gathering
indicators from 442,684 domains. Exploratory factor analysis of 15 indicators
identifies four main latent factors that capture security efforts: content
security, webmaster security, web infrastructure security and web application
security. We confirm, via a fixed-effect regression model, that providers exert
significant influence over the latter two factors, which are both related to
the software stack in their hosting environment. Finally, by means of GLM
regression analysis of these factors on phishing and malware abuse, we show
that the four security and software patching factors explain between 10\% and
19\% of the variance in abuse at providers, after controlling for size. For
web-application security for instance, we found that when a provider moves from
the bottom 10\% to the best-performing 10\%, it would experience 4 times fewer
phishing incidents. We show that providers have influence over patch
levels--even higher in the stack, where CMSes can run as client-side
software--and that this influence is tied to a substantial reduction in abuse
levels
Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic
This paper concerns the problem of the absence of ingress filtering at the
network edge, one of the main causes of important network security issues.
Numerous network operators do not deploy the best current practice - Source
Address Validation (SAV) that aims at mitigating these issues. We perform the
first Internet-wide active measurement study to enumerate networks not
filtering incoming packets by their source address. The measurement method
consists of identifying closed and open DNS resolvers handling requests coming
from the outside of the network with the source address from the range assigned
inside the network under the test. The proposed method provides the most
complete picture of the inbound SAV deployment state at network providers. We
reveal that 32 673 Autonomous Systems (ASes) and 197 641 Border Gateway
Protocol (BGP) prefixes are vulnerable to spoofing of inbound traffic. Finally,
using the data from the Spoofer project and performing an open resolver scan,
we compare the filtering policies in both directions
The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic
Source Address Validation (SAV) is a standard aimed at discarding packets
with spoofed source IP addresses. The absence of SAV for outgoing traffic has
been known as a root cause of Distributed Denial-of-Service (DDoS) attacks and
received widespread attention. While less obvious, the absence of inbound
filtering enables an attacker to appear as an internal host of a network and
may reveal valuable information about the network infrastructure. Inbound IP
spoofing may amplify other attack vectors such as DNS cache poisoning or the
recently discovered NXNSAttack. In this paper, we present the preliminary
results of the Closed Resolver Project that aims at mitigating the problem of
inbound IP spoofing. We perform the first Internet-wide active measurement
study to enumerate networks that filter or do not filter incoming packets by
their source address, for both the IPv4 and IPv6 address spaces. To achieve
this, we identify closed and open DNS resolvers that accept spoofed requests
coming from the outside of their network. The proposed method provides the most
complete picture of inbound SAV deployment by network providers. Our
measurements cover over 55 % IPv4 and 27 % IPv6 Autonomous Systems (AS) and
reveal that the great majority of them are fully or partially vulnerable to
inbound spoofing. By identifying dual-stacked DNS resolvers, we additionally
show that inbound filtering is less often deployed for IPv6 than it is for
IPv4. Overall, we discover 13.9 K IPv6 open resolvers that can be exploited for
amplification DDoS attacks - 13 times more than previous work. Furthermore, we
enumerate uncover 4.25 M IPv4 and 103 K IPv6 vulnerable closed resolvers that
could only be detected thanks to our spoofing technique, and that pose a
significant threat when combined with the NXNSAttack.Comment: arXiv admin note: substantial text overlap with arXiv:2002.0044
Operational Domain Name Classification:From Automatic Ground Truth Generation to Adaptation to Missing Values
With more than 350 million active domain names and at least 200,000 newly registered domains per day, it is technically and economically challenging for Internet intermediaries involved in domain registration and hosting to monitor them and accurately assess whether they are benign, likely registered with malicious intent, or have been compromised. This observation motivates the design and deployment of automated approaches to support investigators in preventing or effectively mitigating security threats. However, building a domain name classification system suitable for deployment in an operational environment requires meticulous design: from feature engineering and acquiring the underlying data to handling missing values resulting from, for example, data collection errors. The design flaws in some of the existing systems make them unsuitable for such usage despite their high theoretical accuracy. Even worse, they may lead to erroneous decisions, for example, by registrars, such as suspending a benign domain name that has been compromised at the website level, causing collateral damage to the legitimate registrant and website visitors. In this paper, we propose novel approaches to designing domain name classifiers that overcome the shortcomings of some existing systems. We validate these approaches with a prototype based on the COMAR (COmpromised versus MAliciously Registered domains) system focusing on its careful design, automated and reliable ground truth generation, feature selection, and the analysis of the extent of missing values. First, our classifier takes advantage of automatically generated ground truth based on publicly available domain name registration data. We then generate a large number of machine-learning models, each dedicated to handling a set of missing features: if we need to classify a domain name with a given set of missing values, we use the model without the missing feature set, thus allowing classification based on all other features. We estimate the importance of features using scatter plots and analyze the extent of missing values due to measurement errors. Finally, we apply the COMAR classifier to unlabeled phishing URLs and find, among other things, that 73% of corresponding domain names are maliciously registered. In comparison, only 27% are benign domains hosting malicious websites. The proposed system has been deployed at two ccTLD registry operators to support their anti-fraud practices.</p
The Cloud Strikes Back: Investigating the Decentralization of IPFS
Interplanetary Filesystem (IPFS) is one of the largest peer-to-peer filesystems in operation. The network is the default storage layer for Web3 and is being presented as a solution to the centralization of the web. In this paper, we present a large-scale, multi-modal measurement study of the IPFS network. We analyze the topology, the traffic, the content providers and the entry points from the classical Internet. Our measurements show significant centralization in the IPFS network and a high share of nodes hosted in the cloud. We also shed light on the main stakeholders in the ecosystem. We discuss key challenges that might disrupt continuing efforts to decentralize the Web and highlight multiple properties that are creating pressures toward centralization
Effect of toxic metals on oral tissues
Herman Katarzyna, Korczyński Mariusz, Janeczek Maciej, Wełmiński Paweł, Kowalczyk-Zając Małgorzata, Leśków Anna, Całkosiński Ireneusz, Dobrzyński Maciej. Effect of toxic metals on oral tissues. Journal of Education, Health and Sport. 2017;7(1):209-220. eISSN 2391-8306. DOI http://dx.doi.org/10.5281/zenodo.253366
http://ojs.ukw.edu.pl/index.php/johs/article/view/4180
The journal has had 7 points in Ministry of Science and Higher Education parametric evaluation. Part B item 754 (09.12.2016).
754 Journal of Education, Health and Sport eISSN 2391-8306 7
© The Author (s) 2017;
This article is published with open access at Licensee Open Journal Systems of Kazimierz Wielki University in Bydgoszcz, Poland
Open Access. This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium,
provided the original author(s) and source are credited. This is an open access article licensed under the terms of the Creative Commons Attribution Non Commercial License
(http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted, non commercial use, distribution and reproduction in any medium, provided the work is properly cited.
This is an open access article licensed under the terms of the Creative Commons Attribution Non Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted, non commercial
use, distribution and reproduction in any medium, provided the work is properly cited.
The authors declare that there is no conflict of interests regarding the publication of this paper.
Received: 02.01.2017. Revised 16.01.2017. Accepted: 20.01.2017.
Wpływ metali toksycznych na tkanki jamy ustnej
Effect of toxic metals on oral tissues
Katarzyna Herman1, Mariusz Korczyński2,3, Maciej Janeczek4, Paweł Wełmiński5, Małgorzata Kowalczyk-Zając1, Anna Leśków6, Ireneusz Całkosiński6, Maciej Dobrzyński1
1 Katedra i Zakład Stomatologii Zachowawczej i Dziecięcej, Uniwersytet Medyczny we Wrocławiu, Krakowska 26, 50-425 Wrocław, Polska
2 Zakład Chirurgii Eksperymentalnej i Badania Biomateriałów, Uniwersytet Medyczny we Wrocławiu, Bujwida 44, 50-368 Wrocław, Polska
3 Katedra Higieny Środowiska i Dobrostanu Zwierząt, Uniwersytet Przyrodniczy we Wrocławiu, Kożuchowska 1/3, 51-631 Wrocław, Polska
4 Zakład Anatomii Zwierząt, Uniwersytet Przyrodniczy we Wrocławiu, Chełmońskiego 38c, 51-630 Wrocław, Polska
5 POLNET Sp. z o.o., Obodrzycka 61, 61-249 Poznań, Polska
6 Samodzielna Pracownia Neurotoksykologii i Diagnostyki Środowiskowej, Uniwersytet Medyczny we Wrocławiu, Grunwaldzka 2, 50-355 Wrocław, Polska
Streszczenie
Metale toksyczne, które powszechnie występują w środowisku mogą wywierać negatywny wpływ na zdrowie ludzi. W pracy przedstawiono problem zmian patologicznych, występujących w jamie ustnej w wyniku narażenia na działanie metali toksycznych. Według literatury, metale toksyczne mogą niekorzystnie wpływać na tkanki miękkie, zęby, proces wydzielania śliny oraz doznania smakowe. Istnieje również ryzyko wystąpienia wad rozwojowych twarzoczaszki, w szczególności rozszczepu podniebienia oraz upośledzenia mineralizacji zawiązków zębów. W związku z tym istotne jest aby ograniczać źródła metali toksycznych, zwłaszcza związane z przemysłem.
Słowa kluczowe: metale toksyczne, jama ustna, błona śluzowa, zęby, ślina
Summary
Toxic metals that commonly occur in human environment may exert a negative influence on people’s health. This study presents the problem of pathological changes occurring within the oral cavity as a result of exposure to toxic metals. According to literature, they may adversely affect soft tissues, teeth, the saliva secretion process or taste sensations. There is also risk of developmental defects of the facial skeleton, particularly the cleft palate and impaired tooth buds mineralization. Therefore, it is essential to limit industrial and non-industrial sources of toxic metals.
Key words: toxic metals, oral cavity, mucosa, teeth, saliva
Adres do korespondencji:
dr n. med. Maciej Dobrzyński
Katedra i Zakład Stomatologii Zachowawczej i Dziecięcej, Uniwersytet Medyczny im. Piastów Śląskich we Wrocławiu, ul. Krakowska 26, 50-425 Wrocław, tel./fax: (71) 784-03-62, e-mail: [email protected]