91 research outputs found
A distributed cyber-security framework for heterogeneous environments
Evolving business models, computing paradigms, and management practices are rapidly re-shaping the usage models of ICT infrastructures, and demanding for more flexibility and dynamicity in enterprise security, beyond the traditional "security perimeter" approach. Since valuable ICT assets cannot be easily enclosed within a trusted physical sandbox any more, there is an increasing need for a new generation of pervasive and capillary cyber-security paradigms over distributed and geographically-scattered systems. Following the generalized trend towards virtualization, automation, software-definition, and hardware/software disaggregation, in this paper we elaborate on a multi-tier architecture made of a common, programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms. Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments, including legacy enterprise networks, IoT installations, and virtual resources deployed in the cloud
Dynamic Model for the Energetic Optimization of Turbocompound Hybrid Powertrains
Abstract This paper presents the simulation activity carried out to analyze the power flows and the energy breakdown of an innovative hybrid-turbocompound powertrain, which will be employed in the 2014 F1 championship. The analyzed powertrain consists in a supercharged internal combustion engine integrated by two electric machines – connected respectively to the turbocharger shaft and to the engine shaft – a static converter and a battery. Simulations through Matlab-Simulink were carried out both in race and in qualifying conditions, obtaining useful information about the electric machines and battery duty cycles and about the calibration of the system operational algorithms during one lap
A New Paradigm to Address Threats for Virtualized Services
With the uptaking of virtualization technologies and the growing usage of public cloud infrastructures, an ever larger number of applications run outside of the traditional enterprise’s perimeter, and require new security paradigms that fit the typical agility and elasticity of cloud models in service creation and management. Though some recent proposals have integrated security appliances in the logical application topology, we argue that this approach is sub-optimal. Indeed, we believe that embedding security agents in virtualization containers and delegating the control logic to the software orchestrator provides a much more effective, flexible, and scalable solution to the problem. In this paper, we motivate our mindset and outline a novel framework for assessing cyber-threats of virtualized applications and services. We also review existing technologies that build the foundation of our proposal, which we are going to develop in the context of a joint research project
Electrical-Loss Analysis of Power-Split Hybrid Electric Vehicles
The growing development of hybrid electric vehicles (HEVs) has seen the spread of architectures with transmission based on planetary gear train, realized thanks to two electric machines. This architecture, by continuously regulating the transmission ratio, allows the internal combustion engine (ICE) to work in optimal conditions. On the one hand, the average ICE efficiency is increased thanks to better loading situations, while, on the other hand, electrical losses are introduced due to the power circulation between the two electrical machines mentioned above. The aim of this study is then to accurately evaluate electrical losses and the average ICE efficiency in various operating conditions and over different road missions. The models used in this study are presented for both the Continuously Variable Transmission (CVT) architecture and the Discontinuously Variable Transmission (DVT) architecture. In addition, efficiency maps of the main components are shown. Finally, the simulation results are presented to point out strengths and weaknesses of the CVT architecture
Automating Mitigation of Amplification Attacks in NFV Services
The combination of virtualization techniques with capillary computing and storage resources allows the instantiation of Virtual Network Functions throughout the network infrastructure, which brings more agility in the development and operation of network services. Beside forwarding and routing, this can be also used for additional functions, e.g., for security purposes. In this paper, we present a framework to systematically create security analytics for virtualized network services, specifically targeting the detection of cyber-attacks. Our framework largely automates the deployment of security sidecars into existing service templates and their interconnection to an external analytics platform. Notably, it leverages code augmentation techniques to dynamically inject and remove inspection probes without affecting service operation. We describe the implementation of a use case for the detection of DNS amplification attacks in virtualized 5G networks, and provide extensive evaluation of our innovative inspection and detection mechanisms. Our results demonstrate better efficiency with respect to existing network monitoring tools in terms of CPU usage, as well as good accuracy in detecting attacks even with variable traffic patterns
Recommended from our members
TKI type switching overcomes ROS1 L2086F in ROS1 fusion-positive cancers
The grammar in this abstract is generally correct, but there’s a minor issue with sentence structure in one part. Here’s a slightly revised version with improved grammar and flow: ROS1 tyrosine kinase inhibitors (TKIs) are highly effective in ROS1-positive non-small cell lung cancer, but resistance remains a challenge. We investigated the activity of various TKIs against wildtype and mutant ROS1, focusing on the emerging L2086F resistance mutation. Using Ba/F3 and NIH3T3 cell models, CRISPR/Cas9-edited isogenic wildtype and mutant patient-derived cell lines, and in vivo tumor growth studies, we compared type I TKIs (crizotinib, entrectinib, taletrectinib, lorlatinib, and repotrectinib) to type II TKIs (cabozantinib and merestinib) and the type I FLT3 inhibitor gilteritinib. The ROS1 L2086F mutant kinase showed resistance to type I TKIs, while type II TKIs retained activity. Gilteritinib inhibited both wildtype and L2086F mutant ROS1 but was ineffective against the G2032R mutation. Structural analyses revealed distinct binding poses for cabozantinib and gilteritinib, explaining their efficacy against L2086F. Clinical cases demonstrated cabozantinib’s effectiveness in patients with TKI-resistant, ROS1 L2086F mutant NSCLCs. This study provides the first comprehensive report of ROS1 L2086F in the context of later-generation TKIs, including macrocyclic inhibitors. While cabozantinib effectively inhibits ROS1 L2086F, its multi-kinase inhibitor nature highlights the need for more selective and better-tolerated TKIs to overcome kinase-intrinsic resistance. Gilteritinib may offer an alternative for targeting ROS1 L2086F with distinct off-target toxicities, but further studies are required to fully evaluate its potential in this setting.</p
- …