529 research outputs found

    IoT-MQTT based denial of service attack modelling and detection

    Get PDF
    Internet of Things (IoT) is poised to transform the quality of life and provide new business opportunities with its wide range of applications. However, the bene_ts of this emerging paradigm are coupled with serious cyber security issues. The lack of strong cyber security measures in protecting IoT systems can result in cyber attacks targeting all the layers of IoT architecture which includes the IoT devices, the IoT communication protocols and the services accessing the IoT data. Various IoT malware such as Mirai, BASHLITE and BrickBot show an already rising IoT device based attacks as well as the usage of infected IoT devices to launch other cyber attacks. However, as sustained IoT deployment and functionality are heavily reliant on the use of e_ective data communication protocols, the attacks on other layers of IoT architecture are anticipated to increase. In the IoT landscape, the publish/- subscribe based Message Queuing Telemetry Transport (MQTT) protocol is widely popular. Hence, cyber security threats against the MQTT protocol are projected to rise at par with its increasing use by IoT manufacturers. In particular, the Internet exposed MQTT brokers are vulnerable to protocolbased Application Layer Denial of Service (DoS) attacks, which have been known to cause wide spread service disruptions in legacy systems. In this thesis, we propose Application Layer based DoS attacks that target the authentication and authorisation mechanism of the the MQTT protocol. In addition, we also propose an MQTT protocol attack detection framework based on machine learning. Through extensive experiments, we demonstrate the impact of authentication and authorisation DoS attacks on three opensource MQTT brokers. Based on the proposed DoS attack scenarios, an IoT-MQTT attack dataset was generated to evaluate the e_ectiveness of the proposed framework to detect these malicious attacks. The DoS attack evaluation results obtained indicate that such attacks can overwhelm the MQTT brokers resources even when legitimate access to it was denied and resources were restricted. The evaluations also indicate that the proposed DoS attack scenarios can signi_cantly increase the MQTT message delay, especially in QoS2 messages causing heavy tail latencies. In addition, the proposed MQTT features showed high attack detection accuracy compared to simply using TCP based features to detect MQTT based attacks. It was also observed that the protocol _eld size and length based features drastically reduced the false positive rates and hence, are suitable for detecting IoT based attacks

    Interactions of short chain phenylalkanoic acids within ionic surfactant micelles in aqueous media

    Get PDF
    % SDS KR nema Solubilization and interactions of phenylalkanoic acids induced by cationic surfactant, cetyltrimethylammonium bromide (CTAB) and an anionic surfactant, sodium dodecyl sulfate (SDS) was investigated spectrophotometrically at 25.0°C. The UV spectra of the additives (acids) were measured with and without surfactant above and below critical micelle concentration (cmc) of the surfactant. The presence of alkyl chain in phenylalkanoic acids is responsible for hydrophobic interaction resulting in shift of the spectra towards longer wavelength (red shift). The value of partition coefficient (Kx) between the bulk water and surfactant micelles and in turn standard free energy change of solubilization (ΔGpº) were also estimated by measuring the differential absorbance (ΔA) of the additives in micellar solutions

    Gender Inequality: Work Place Issues

    Get PDF
    Women have always been a most integral part of workforce. If we stretch back to the eighteenth century women not only used to work at their homes but also outside their houses, mostly as a maid. After the industrial revolution number of women entering in to the workforce increases and this change further increases with the time. However, this increase didn’t assure them that they will have equal rights or will be treated on fair basis rather than on gender basis.  Today when we are living in a fast paced technological era, females are still facing problems at workplace in many different ways. This paper is intended to cover all those issues which has been identified in different studies moreover, an analysis on factors behind them.  The first part of this paper will briefly discuss the historical background of women participation at workplace, then this part will be followed by discussion on different researches and studies. In this paper six different studies are discussed that reveals six or more factors that cause inequality and discrimination on gender basis at workplace. Each study is discussed and analyzed with the help of its finding. The statistics provided by those researches help to understand the real picture of the issue. The last part, conclusion, summarizes the whole research. It roundup and highlights the main issues which is discussed in the earlier part. It will be helpful for the reader to find the work of the current research done in this particular area of study. Keywords: Discrimination, Workforce, Inequality, Industrial Revolution DOI: 10.7176/JESD/11-20-05 Publication date:October 31st 202

    Ontology: Core Process Mining and Querying Enabling Tool

    Get PDF
    Ontology permits the addition of semantics to process models derived from mining the various data stored in many information systems. The ontological schema enables for automated querying and inference of useful knowledge from the different domain processes. Indeed, such conceptualization methods particularly ontologies for process management which is currently allied to semantic process mining trails to combine process models with ontologies, and are increasingly gaining attention in recent years. In view of that, this chapter introduces an ontology-based mining approach that makes use of concepts within the extracted event logs about domain processes to propose a method which allows for effective querying and improved analysis of the resulting models through semantic labelling (annotation), semantic representation (ontology) and semantic reasoning (reasoner). The proposed method is a semantic-based process mining approach that is able to induce new knowledge based on previously unobserved behaviours, and a more intuitive and easy way to represent and query the datasets and the discovered models compared to other standard logical procedures. To this end, the study claims that it is possible to apply effective reasoning methods to make inferences over a process knowledge-base (e.g. the learning process) that leads to automated discovery of learning patterns and/or behaviour

    Exact Solutions of Generalized Modified Boussinesq, Kuramoto-Sivashinsky, and Camassa-Holm Equations via Double Reduction Theory

    Get PDF
    We find exact solutions of the Generalized Modified Boussinesq (GMB) equation, the Kuromoto-Sivashinsky (KS) equation the and, Camassa-Holm (CH) equation by utilizing the double reduction theory related to conserved vectors. The fourth order GMB equation involves the arbitrary function and mixed derivative terms in highest derivative. The partial Noether’s approach yields seven conserved vectors for GMB equation and one conserved for vector KS equation. Due to presence of mixed derivative term the conserved vectors for GMB equation derived by the Noether like theorem do not satisfy the divergence relationship. The extra terms that constitute the trivial part of conserved vectors are adjusted and the resulting conserved vectors satisfy the divergence property. The double reduction theory yields two independent solutions and one reduction for GMB equation and one solution for KS equation. For CH equation two independent solutions are obtained elsewhere by double reduction theory with the help of conserved Vectors

    Stability indicating HPLC method for the simultaneous determination of moxifloxacin and prednisolone in pharmaceutical formulations

    Get PDF
    BACKGROUND: A simple, specific, and fast stability indicating reverse phase liquid chromatographic method was established for instantaneous determination of moxifloxacin and prednisolone in bulk drugs and pharmaceutical formulations. RESULTS: Optimum chromatographic separations among the moxifloxacin, prednisolone and stress-induced degradation products were achieved within 10 minutes by use of BDS Hypersil C8 column (250 X 4.6 mm, 5 μm) as stationary phase with mobile phase consisted of a mixture of phosphate buffer (18 mM) containing 0.1% (v/v) triethylamine, at pH 2.8 (adjusted with dilute phosphoric acid) and methanol (38:62 v/v) at a flow rate of 1.5 mL min(-1). Detection was performed at 254 nm using diode array detector. The method was validated in accordance with ICH guidelines. Response was a linear function of concentrations over the range of 20–80 μg mL(-1) for moxifloxacin (r2 ≥ 0.998) and 40–160 μg mL(-1) for prednisolone (r2 ≥ 0.998). The method was resulted in good separation of both the analytes and degradation products with acceptable tailing and resolution. The peak purity index for both the analytes after all types of stress conditions was ≥ 0.9999 indicated a complete separation of both the analyte peaks from degradation products. The method can therefore, be regarded as stabilityindicating. CONCLUSIONS: The developed method can be applied successfully for simultaneous determination of moxifloxacin and prednisolone in pharmaceutical formulations and their stability studies

    Anomaly Detection Technique for Honeynet Data Analysis

    Get PDF

    Zika Virus, Microcephaly and its Possible Global Spread

    Get PDF
    Zika virus is an arbovirus that is spreading at an alarming state in the American continents and now in Asian countries. The Aedes mosquitoes are the vectors for the spread of this virus beside other ways of transmission. Currently, there are no vaccines or drugs available for its treatment. The Zika virus–related microcephaly cases are reported in fetuses of pregnant women who got this viral infection. However, the exact mechanism of Zika virus and microcephaly is still not established. Here we review Zika virus epidemiology, its unusual relationship with microcephaly in fetuses and current scientific research progress on it
    corecore