778 research outputs found

    Obtendo segurança em uma rede a partir da utilização de intrusion

    Get PDF
    Este trabalho tem por objetivo realizar um estudo sobre algumas soluções em segurança de redes de computadores, culminando no Intrusion Prevention System (IPS). Esse sistema possui as mesmas características de um Intrusion Detection System (IDS), porém seu maior diferencial é que ele trabalha de modo ativo na rede, ou seja, ele não fica apenas coletando tráfego, mas interagindo com a rede. A proposta desses sistemas de prevenção de intrusão surgiu recentemente devido á habilidade de coletar e analisar tráfego TCP/IP em tempo real, a fim de, sempre que necessário, executar medidas próativas ou, pelo menos, reativas.This work has for aim to carry through a study on some solutions in security of computer networks, with its final results in the Intrusion Prevention System (IPS). This system has the same characteristics of a Intrusion Detection System (IDS), however the biggest difference between them is that it works in active way in the net, or either, does not only collect traffic, but it interacts with the net. The proposal of these systems of prevention of intrusion recently appeared due to ability to collect and to analyze traffic TCP/IP in real time, so that, whenever it’s necessary, it performs pro-active or, at least, reactive actions.Eje: Arquitectura, Redes y Sistemas Operativos (ARSO)Red de Universidades con Carreras en Informática (RedUNCI

    Obtendo segurança em uma rede a partir da utilização de intrusion

    Get PDF
    Este trabalho tem por objetivo realizar um estudo sobre algumas soluções em segurança de redes de computadores, culminando no Intrusion Prevention System (IPS). Esse sistema possui as mesmas características de um Intrusion Detection System (IDS), porém seu maior diferencial é que ele trabalha de modo ativo na rede, ou seja, ele não fica apenas coletando tráfego, mas interagindo com a rede. A proposta desses sistemas de prevenção de intrusão surgiu recentemente devido á habilidade de coletar e analisar tráfego TCP/IP em tempo real, a fim de, sempre que necessário, executar medidas próativas ou, pelo menos, reativas.This work has for aim to carry through a study on some solutions in security of computer networks, with its final results in the Intrusion Prevention System (IPS). This system has the same characteristics of a Intrusion Detection System (IDS), however the biggest difference between them is that it works in active way in the net, or either, does not only collect traffic, but it interacts with the net. The proposal of these systems of prevention of intrusion recently appeared due to ability to collect and to analyze traffic TCP/IP in real time, so that, whenever it’s necessary, it performs pro-active or, at least, reactive actions.Eje: Arquitectura, Redes y Sistemas Operativos (ARSO)Red de Universidades con Carreras en Informática (RedUNCI

    Metodologia para validar IPS’s de código-fonte aberto

    Get PDF
    O presente trabalho tem por objetivo descrever uma metodologia para realizar testes com ferramentas IPS (Intrusion Prevention Systems). Essas ferramentas são mecanismos que são implementados como gateways (in-line) em uma rede de computadores para receber, analisar e encaminhar o tráfego para o seu destino. A análise é feita através da procura por pacotes que contenham assinaturas de ataques aos computadores da rede. Como se trata de uma nova tecnologia é necessário determinar métricas para avaliar os IPS que estão surgindo no mercado. Da mesma forma como acontece com os IDS’s (Intrusion Detection Systems), não é uma tarefa fácil determinar métricas concretas para avaliar os IPS.Eje: I - Workshop de Ingeniería de Software y Base de DatosRed de Universidades con Carreras en Informática (RedUNCI

    Metodologia para validar IPS’s de código-fonte aberto

    Get PDF
    O presente trabalho tem por objetivo descrever uma metodologia para realizar testes com ferramentas IPS (Intrusion Prevention Systems). Essas ferramentas são mecanismos que são implementados como gateways (in-line) em uma rede de computadores para receber, analisar e encaminhar o tráfego para o seu destino. A análise é feita através da procura por pacotes que contenham assinaturas de ataques aos computadores da rede. Como se trata de uma nova tecnologia é necessário determinar métricas para avaliar os IPS que estão surgindo no mercado. Da mesma forma como acontece com os IDS’s (Intrusion Detection Systems), não é uma tarefa fácil determinar métricas concretas para avaliar os IPS.Eje: I - Workshop de Ingeniería de Software y Base de DatosRed de Universidades con Carreras en Informática (RedUNCI

    Design for a three-dimensional printed laryngoscope blade for the intubation of rats

    Get PDF
    Endotracheal intubation of rats is a common technique that is best carried out with a laryngoscope blade. The blade allows direct visualization of the trachea during intubation, reducing the risk of accidental intubation of the esophagus. Laryngoscope blades for use in rats are not commercially available, however. Three-dimensional (3D) printers have recently become available and can be used to produce small plastic items simply and reliably based on an established design. The authors created a design for a laryngoscope blade to be printed with a 3D printer and polylactide filament material. Using the printed laryngoscope blade, the authors successfully intubated 35 rats. The presented design may be used by any experimenter with access to a 3D printer to fabricate the same laryngoscope blade for their intubation procedures

    The Long-Baseline Neutrino Experiment: Exploring Fundamental Symmetries of the Universe

    Get PDF
    The preponderance of matter over antimatter in the early Universe, the dynamics of the supernova bursts that produced the heavy elements necessary for life and whether protons eventually decay --- these mysteries at the forefront of particle physics and astrophysics are key to understanding the early evolution of our Universe, its current state and its eventual fate. The Long-Baseline Neutrino Experiment (LBNE) represents an extensively developed plan for a world-class experiment dedicated to addressing these questions. LBNE is conceived around three central components: (1) a new, high-intensity neutrino source generated from a megawatt-class proton accelerator at Fermi National Accelerator Laboratory, (2) a near neutrino detector just downstream of the source, and (3) a massive liquid argon time-projection chamber deployed as a far detector deep underground at the Sanford Underground Research Facility. This facility, located at the site of the former Homestake Mine in Lead, South Dakota, is approximately 1,300 km from the neutrino source at Fermilab -- a distance (baseline) that delivers optimal sensitivity to neutrino charge-parity symmetry violation and mass ordering effects. This ambitious yet cost-effective design incorporates scalability and flexibility and can accommodate a variety of upgrades and contributions. With its exceptional combination of experimental configuration, technical capabilities, and potential for transformative discoveries, LBNE promises to be a vital facility for the field of particle physics worldwide, providing physicists from around the globe with opportunities to collaborate in a twenty to thirty year program of exciting science. In this document we provide a comprehensive overview of LBNE's scientific objectives, its place in the landscape of neutrino physics worldwide, the technologies it will incorporate and the capabilities it will possess.Comment: Major update of previous version. This is the reference document for LBNE science program and current status. Chapters 1, 3, and 9 provide a comprehensive overview of LBNE's scientific objectives, its place in the landscape of neutrino physics worldwide, the technologies it will incorporate and the capabilities it will possess. 288 pages, 116 figure

    Search for new particles in events with energetic jets and large missing transverse momentum in proton-proton collisions at root s=13 TeV

    Get PDF
    A search is presented for new particles produced at the LHC in proton-proton collisions at root s = 13 TeV, using events with energetic jets and large missing transverse momentum. The analysis is based on a data sample corresponding to an integrated luminosity of 101 fb(-1), collected in 2017-2018 with the CMS detector. Machine learning techniques are used to define separate categories for events with narrow jets from initial-state radiation and events with large-radius jets consistent with a hadronic decay of a W or Z boson. A statistical combination is made with an earlier search based on a data sample of 36 fb(-1), collected in 2016. No significant excess of events is observed with respect to the standard model background expectation determined from control samples in data. The results are interpreted in terms of limits on the branching fraction of an invisible decay of the Higgs boson, as well as constraints on simplified models of dark matter, on first-generation scalar leptoquarks decaying to quarks and neutrinos, and on models with large extra dimensions. Several of the new limits, specifically for spin-1 dark matter mediators, pseudoscalar mediators, colored mediators, and leptoquarks, are the most restrictive to date.Peer reviewe

    Combined searches for the production of supersymmetric top quark partners in proton-proton collisions at root s=13 TeV

    Get PDF
    A combination of searches for top squark pair production using proton-proton collision data at a center-of-mass energy of 13 TeV at the CERN LHC, corresponding to an integrated luminosity of 137 fb(-1) collected by the CMS experiment, is presented. Signatures with at least 2 jets and large missing transverse momentum are categorized into events with 0, 1, or 2 leptons. New results for regions of parameter space where the kinematical properties of top squark pair production and top quark pair production are very similar are presented. Depending on themodel, the combined result excludes a top squarkmass up to 1325 GeV for amassless neutralino, and a neutralinomass up to 700 GeV for a top squarkmass of 1150 GeV. Top squarks with masses from 145 to 295 GeV, for neutralino masses from 0 to 100 GeV, with a mass difference between the top squark and the neutralino in a window of 30 GeV around the mass of the top quark, are excluded for the first time with CMS data. The results of theses searches are also interpreted in an alternative signal model of dark matter production via a spin-0 mediator in association with a top quark pair. Upper limits are set on the cross section for mediator particle masses of up to 420 GeV

    Probing effective field theory operators in the associated production of top quarks with a Z boson in multilepton final states at root s=13 TeV

    Get PDF
    Peer reviewe

    Search for a heavy Higgs boson decaying into two lighter Higgs bosons in the tau tau bb final state at 13 TeV

    Get PDF
    A search for a heavy Higgs boson H decaying into the observed Higgs boson h with a mass of 125 GeV and another Higgs boson h(S) is presented. The h and h(S) bosons are required to decay into a pair of tau leptons and a pair of b quarks, respectively. The search uses a sample of proton-proton collisions collected with the CMS detector at a center-of-mass energy of 13TeV, corresponding to an integrated luminosity of 137 fb(-1). Mass ranges of 240-3000 GeV for m(H) and 60-2800 GeV for m(hS) are explored in the search. No signal has been observed. Model independent 95% confidence level upper limits on the product of the production cross section and the branching fractions of the signal process are set with a sensitivity ranging from 125 fb (for m(H) = 240 GeV) to 2.7 fb (for m(H) = 1000 GeV). These limits are compared to maximally allowed products of the production cross section and the branching fractions of the signal process in the next-to-minimal supersymmetric extension of the standard model.Peer reviewe
    corecore