10 research outputs found

    Application of PSVR-DNS Algorithm for Attacker Detection and Isolation

    Get PDF
    The DNS (Domain Name System) is used to map and convert human-friendly domain names to the numeric IP (Internet Protocol) addresses. As with the operation of any communication system, there are some security risks associated with the operation of DNS. Actions targeting the availability or stability of a network\u27s DNS service are considered DNS attack. For example, a high volume of traffic and a large number of requests coming to DNS servers are part of a type of DoS (Denial of Service) attack that uses DNS for amplification. Although most DNS servers are open source, some commercial protective DNS services are available for network traffic control, filtering and automatic blocking of requests to undesirable, dangerous or malicious internet domains, but the price of such services is high. In this paper, a new PSVR-DNS (Probability Support Vector Regression-Domain Name System) algorithm is proposed for the purpose of detecting and isolating attackers who pose a threat to an uninterrupted work of the DNS servers. The main focus is on the prevention of the DNS cache poisoning. The collected results showed that the proposed PSVR-DNS algorithm achieves better performance related to faster detection and isolation of attacks compared to some existing algorithms

    Techno-economic Model for Rural Broadband Access Implementation

    Get PDF
    Unatoč brojnim koristima koje proizlaze iz primjene Å”irokopojasnih pristupnih tehnologija i usluga, danas postoji mnoÅ”tvo ruralnih područja u Svijetu u kojima Å”irokopojasni pristup Internetu nije dostupan. Ova se disertacija bavi problematikom vezanom uz uvođenje Å”irokopojasnog pristupa Internetu u ruralnim područjima. U disertaciji je provedena analiza stanja te su utvrđene razlike u stopama usvajanja i primjeni Å”irokopojasnih tehnologija i usluga u odabranim ruralnim i urbanim područjima. Nadalje, prikazana je metodologija za rjeÅ”avanje problematike nedovoljne dostupnosti Å”irokopojasnog pristupa Internetu u ruralnim područjima, odnosno problematike tzv. digitalnog jaza - određivanje najrelevantnijih čimbenika za uvođenje Å”irokopojasnog pristupa Internetu uz primjenu regresijske analize i uključivanje tih čimbenika u postupak tehno-ekonomskog modeliranja. Isto tako, u radu su razmotreni i načini na koje se tehno-ekonomske metode modeliranja mogu koristiti pri povezivanju analiziranih tehnoekonomski orijentiranih zahtjeva korisnika (za kvalitetom usluga, količinom prometa, pristupnom brzinom, cijenom usluga) te zahtjeva operatora za isplativim tehničkim rjeÅ”enjima za ruralna područja. Zato je definiran novi okvir za analizu i modeliranje eksplicitno definiranih zahtjeva. Predloženi okvir služi kao nadogradnja tehno-ekonomskih modela i omogućuje detaljniju analizu specifičnosti različitih ruralnih područja temeljenu na dostupnim podacima. Na posljetku, prikazana je korisnost predloženog modela pri izboru najboljih strategija za operatore u konkurentskom okruženju.Despite the numerous benefits arising from the application of broadband access technologies and services, in the majority of rural areas in the world broadband Internet access is not yet available. Therefore, the thesis deals with the issues related to the introduction of broadband Internet access in rural areas. In the thesis, the differences in the adoption rates of broadband technology and services in rural and urban areas for several studied cases are examined. The given results indicated a lower level of broadband adoption in rural compared to urban areas, i.e. the presence of the digital divide. Therefore, the selected methodology for addressing the digital divide problem is introduced ā€“ the determination of the most relevant factors for broadband adoption using regression analysis, and the inclusion of these factors in the techno-economic modeling process. Furthermore, the techno-economic modeling methods used for connecting analyzed techno-economically oriented user requirements (for the quality of broadband services, the broadband traffic amount, the broadband access speed, and the broadband service price) with the operatorsā€™ requirements on the cost effective business models in rural areas are considered. Therefore, a new framework for analyzing and modeling the explicitly defined users and operatorsā€™ requirements is proposed. The proposed framework serves as an upgrade for the existing techno-economic models and allows a detailed analysis of the specificities of different rural areas, based on the available data. Finally, the efficiency of the proposed model application in choosing the best business strategies for operators in a competitive environment is shown

    Security Aspects of IPv6-based Wireless Sensor Networks

    Get PDF
    Seamless integration of wireless sensor networks (WSN) with conventional IP-based networks is a very important basis for the Internet of Things (IoT) concept. To realize this goal, it is important to implement the IP protocol stack into a WSN. A global IP-based network is currently going through a transition from IPv4 to IPv6. Therefore, IPv6 should have priority in the implementation of the IP protocol into WSN. The paper analyses the existing security threats and possible countermeasures in IPv6-based WSNs. It also analyzes the implementation of a unique security framework for IPv6-based WSNs. The paper also analyzes a possible intrusion detection system for IPv6-based WSNs

    Security Aspects of IPv6-based Wireless Sensor Networks

    Get PDF
    Seamless integration of wireless sensor networks (WSN) with conventional IP-based networks is a very important basis for the Internet of Things (IoT) concept. To realize this goal, it is important to implement the IP protocol stack into a WSN. A global IP-based network is currently going through a transition from IPv4 to IPv6. Therefore, IPv6 should have priority in the implementation of the IP protocol into WSN. The paper analyses the existing security threats and possible countermeasures in IPv6-based WSNs. It also analyzes the implementation of a unique security framework for IPv6-based WSNs. The paper also analyzes a possible intrusion detection system for IPv6-based WSNs

    Protecting Information with Subcodstanography

    Get PDF
    In modern communication systems, one of the most challenging tasks involves the implementation of adequate methods for successful and secure transfer of confidential digital information over an unsecured communication channel. Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. Each encryption algorithm can be decrypted within sufficient time and with sufficient resources. The possibility of decryption has increased with the development of computer technology since available computer speeds enable the decryption process based on the exhaustive data search. This has led to the development of steganography, a science which attempts to hide the very existence of confidential information. However, the stenography also has its disadvantages, listed in the paper. Hence, a new method which combines the favourable properties of cryptography based on substitution encryption and stenography is analysed in the paper. The ability of hiding the existence of confidential information comes from steganography and its encryption using a coding table makes its content undecipherable. This synergy greatly improves protection of confidential information

    Broadband ecosystem elements in techno-economic modelling and analysing of broadband access solutions for rural areas

    Get PDF
    S obzirom na postojeće razvojne inicijative i strategije čiji je cilj smanjenje postojećeg digitalnog jaza između europskih ruralnih i urbanih područja do 2020. godine, u radu je provedena analiza trenutnog stanja na tržiÅ”tu Å”irokopojasnog Interneta na primjeru hrvatskih ruralnih područja te su navedene mogućnosti daljnje implementacije Å”irokopojasnih pristupnih rjeÅ”enja u ruralna područja u kontekstu analize elemenata Å”irokopojasnog ekosustava. Nadalje, u cilju rjeÅ”avanja postojećeg problema digitalnog jaza, pri analizama načina implementacije Å”irokopojasnih pristupnih rjeÅ”enja u ruralnim područjima predložena je primjena proÅ”irenog tehno-ekonomskog modeliranja. Navedeno proÅ”irenje nadograđuje standardne modele, a omogućuje detaljniju analizu specifičnosti različitih pristupnih rjeÅ”enja za ruralna područja. U posljednjem dijelu rada prikazana je mogućnost primjene predloženog modela pri odabiru najboljih poslovnih strategija za različita fiksna i mobilna, žična te bežična Å”irokopojasna pristupna rjeÅ”enja za ruralna područja.Encouraged by broadband development initiatives and strategies that aim at the reduction of the existing digital divide between rural and urban European areas by the year 2020, the current situation in the case study of Croatian rural broadband market is analysed, and the possibilities for further broadband Internet access implementation in rural areas are highlighted in the paper within the context of broadband ecosystem elements analysis. Furthermore, in order to address the exisiting digital divide problem, an extended techno-economic modelling process for rural broadband Internet access implementation analyses is proposed. The proposed additional part of model serves as an upgrade for the standard techno-economic models and allows a detailed analysis of the specificities of different rural areas, based on the available data. Finally, the efficiency of the proposed modelā€™s application when choosing the best business strategies for different fixed and mobile, wired and wireless broadband access solutions in rural areas is presented

    Characterization of a S-adenosyl-l-methionine (SAM)-accumulating strain of Scheffersomyces stipitis

    Get PDF
    S-adenosyl-l-methionine (SAM) is an important molecule in the cellular metabolism of mammals. In this study, we examined several of the physiological characteristics of a SAM-accumulating strain of the yeast Scheffersomyces stipitis (M12), including SAM production, ergosterol content, and ethanol tolerance. S. stipitis M12 accumulated up to 52.48 mg SAM/g dry cell weight. Proteome analyses showed that the disruption of C-24 methylation in ergosterol biosynthesis, a step mediated by C-24 sterol methyltransferase (Erg6p), results in SAM accumulation by S. stipitis M12 compared to the wild-type strain. A comparative proteome-wide analysis identified 25 proteins that were differentially expressed by S. stipitis M12. These proteins are involved in ribosome biogenesis, translation, the stress response, ubiquitin-dependent catabolic processes, the cell cycle, ethanol tolerance, posttranslational modification, peroxisomal membrane stability, epigenetic regulation, the actin cytoskeleton and cell morphology, iron and copper homeostasis, cell signaling, and energy metabolism. [Int Microbiol 2015; 18(2):117-125]Keywords: Scheffersomyces stipitis · S-adenosyl- l-methionine (SAM) · SAM accumulating yeast · C-24 sterol methyltransferase (Erg6p

    Medical applications of wireless sensor networks ā€“ current status and future directions

    No full text
    In recent years a significant development of BASN (Body AreaSensor Networks) as a special subclass of WSN (Wireless SensorNetworks) has emerged. These networks have enabled a rapiddevelopment of telemedicine systems, which provide remote monitoringof patients and their vital parameters. The article givesa short overview of the BASN networks. Furthermore, a generalsystem architecture of telemedicine systems is proposed. The proposedarchitecture includes a local sensory area, a communicationnetwork area and an institutional network area. It also providesthe security and privacy of patient-related data. Furthermore, thearticle surveys some existing telemedicine systems. Finally, somecurrent problems are explained and the directions for the futuredevelopment of the telemedicine systems are given

    Distribution and Allocation of Network Resources Based on Predictive Analyses of Time-Series Telecommunications Data

    Get PDF
    With the fast development of different communication technologies, applications, and services, the adoption of advanced sensory and computing solutions, such as the various Internet of Things (IoT) and mobile computing solutions, is continuously growing. The massive adoption of mobile computing and IoT sensory devices encouraged the continuous growth of generated network traffic. Therefore, the selection of adequate solutions for efficient data processing became necessary. Despite numerous advantages arising from effective data processing, operators and enterprises working within the ICT domain have only limited amounts of available networking resources to store, process, and use valuable information extracted from large quantities of gathered data. In this paper, an optimal planning process and prediction of usage of network resources is examined. It takes into consideration the results of predictive modeling processes based on available sets of time series telecommunications data. The given forecasts enable effective selection of network architectures, as well as the distribution and allocation of network resources considering the cloud, edge, and fog networking concepts

    Kiselo tijesto ā€“ tradicionalna i prirodna metoda za povećanje kvalitete pekarskih proizvoda

    Get PDF
    Bread has been an essential part of human nutrition and culture for thousands of years. Every step of itā€™s production, from careful raw material selection to dough preparation, processing and baking, could be considered as art that ensure unlimited abundance of color, taste and aroma. Diversity of bakery products is result of the diversities in tradition, culture and geographic origin. All around the world alluring and aromatic bakery products always contain sourdough. Sourdough is a complex microbial ecosystem that is composed of lactic acid bacteria and yeasts. The use of lactic acid bacteria in the bread production has long tradition, from spontaneous fermentations (leavening the dough only), to the development and use of defi ned and functional starter cultures. This review covers the sourdough technology, with major emphasis on production of wheat bread with enhanced nutritional value, prolonged shelf life, better taste and aroma.Kruh je od pamtivijeka neizostavni dio ljudske prehrane i kulture. Svaki korak u njegovoj proizvodnji, od pažljivog izbora sirovina do pripreme i obrade tijesta te procesa pečenja, predstavlja dio umjetnosti koja u konačnici osigurava neograničeno bogatstvo boje, okusa i arome kruha. Raznolikost pekarskih proizvoda rezultat je različitosti tradicije, kulture te geografskog podrijetla. Međutim, san svakog pekara, primamljivi i mirisni pekarski proizvodi diljem svijeta, uvijek sadržavaju kiselo tijesto. Kiselo tijesto je kompleksni mikrobni ekosustav kojeg čine bakterije mliječne kiseline i kvasci. Upotreba bakterija mliječne kiseline u pripremi kruha ima dugu tradiciju, od spontanih fermentacija gdje je njihova uloga bila samo dizanje tijesta, preko defi niranih starter kultura, do razvoja i primjene funkcionalnih starter kultura. U ovom radu dat je prikaz tehnologije proizvodnje kiselog tijesta s naglaskom na proizvodnju pÅ”eničnog kruha povećane nutritivne vrijednosti i trajnosti, bogatijeg okusa i arome
    corecore