3,195 research outputs found

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks

    Get PDF
    Distributed Denial of Service (DDoS) flooding attacks are one of the biggest concerns for security professionals. DDoS flooding attacks are typically explicit attempts to disrupt legitimate users' access to services. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies (i.e., Botnets). Once an attack army has been set up, an attacker can invoke a coordinated, large-scale attack against one or more targets. Developing a comprehensive defense mechanism against identified and anticipated DDoS flooding attacks is a desired goal of the intrusion detection and prevention research community. However, the development of such a mechanism requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various DDoS flooding attacks. In this paper, we explore the scope of the DDoS flooding attack problem and attempts to combat it. We categorize the DDoS flooding attacks and classify existing countermeasures based on where and when they prevent, detect, and respond to the DDoS flooding attacks. Moreover, we highlight the need for a comprehensive distributed and collaborative defense approach. Our primary intention for this work is to stimulate the research community into developing creative, effective, efficient, and comprehensive prevention, detection, and response mechanisms that address the DDoS flooding problem before, during and after an actual attack. © 1998-2012 IEEE

    Implied Motion From Form Shows Motion Aids the Perception of Global Form in Amblyopia

    Get PDF

    Multi-site campaign for transit timing variations of WASP-12 b: possible detection of a long-period signal of planetary origin

    Full text link
    The transiting planet WASP-12 b was identified as a potential target for transit timing studies because a departure from a linear ephemeris was reported in the literature. Such deviations could be caused by an additional planet in the system. We attempt to confirm the existence of claimed variations in transit timing and interpret its origin. We organised a multi-site campaign to observe transits by WASP-12 b in three observing seasons, using 0.5-2.6-metre telescopes. We obtained 61 transit light curves, many of them with sub-millimagnitude precision. The simultaneous analysis of the best-quality datasets allowed us to obtain refined system parameters, which agree with values reported in previous studies. The residuals versus a linear ephemeris reveal a possible periodic signal that may be approximated by a sinusoid with an amplitude of 0.00068+/-0.00013 d and period of 500+/-20 orbital periods of WASP-12 b. The joint analysis of timing data and published radial velocity measurements results in a two-planet model which better explains observations than single-planet scenarios. We hypothesize that WASP-12 b might be not the only planet in the system and there might be the additional 0.1 M_Jup body on a 3.6-d eccentric orbit. A dynamical analysis indicates that the proposed two-planet system is stable over long timescales.Comment: Accepted for publication in A&

    Results from the First Science Run of the ZEPLIN-III Dark Matter Search Experiment

    Get PDF
    The ZEPLIN-III experiment in the Palmer Underground Laboratory at Boulby uses a 12kg two-phase xenon time projection chamber to search for the weakly interacting massive particles (WIMPs) that may account for the dark matter of our Galaxy. The detector measures both scintillation and ionisation produced by radiation interacting in the liquid to differentiate between the nuclear recoils expected from WIMPs and the electron recoil background signals down to ~10keV nuclear recoil energy. An analysis of 847kg.days of data acquired between February 27th 2008 and May 20th 2008 has excluded a WIMP-nucleon elastic scattering spin-independent cross-section above 8.1x10(-8)pb at 55GeV/c2 with a 90% confidence limit. It has also demonstrated that the two-phase xenon technique is capable of better discrimination between electron and nuclear recoils at low-energy than previously achieved by other xenon-based experiments.Comment: 12 pages, 17 figure

    Convolutional Neural Networks Applied to Neutrino Events in a Liquid Argon Time Projection Chamber

    Full text link
    We present several studies of convolutional neural networks applied to data coming from the MicroBooNE detector, a liquid argon time projection chamber (LArTPC). The algorithms studied include the classification of single particle images, the localization of single particle and neutrino interactions in an image, and the detection of a simulated neutrino event overlaid with cosmic ray backgrounds taken from real detector data. These studies demonstrate the potential of convolutional neural networks for particle identification or event detection on simulated neutrino interactions. We also address technical issues that arise when applying this technique to data from a large LArTPC at or near ground level

    A survey of security issue in multi-agent systems

    Get PDF
    Multi-agent systems have attracted the attention of researchers because of agents' automatic, pro-active, and dynamic problem solving behaviors. Consequently, there has been a rapid development in agent technology which has enabled us to provide or receive useful and convenient services in a variety of areas such as banking, transportation, e-business, and healthcare. In many of these services, it is, however, necessary that security is guaranteed. Unless we guarantee the security services based on agent-based systems, these services will face significant deployment problems. In this paper, we survey existing work related to security in multi-agent systems, especially focused on access control and trust/reputation, and then present our analyses. We also present existing problems and discuss future research challenges. © Springer Science+Business Media B.V 2011

    Noise Characterization and Filtering in the MicroBooNE Liquid Argon TPC

    Full text link
    The low-noise operation of readout electronics in a liquid argon time projection chamber (LArTPC) is critical to properly extract the distribution of ionization charge deposited on the wire planes of the TPC, especially for the induction planes. This paper describes the characteristics and mitigation of the observed noise in the MicroBooNE detector. The MicroBooNE's single-phase LArTPC comprises two induction planes and one collection sense wire plane with a total of 8256 wires. Current induced on each TPC wire is amplified and shaped by custom low-power, low-noise ASICs immersed in the liquid argon. The digitization of the signal waveform occurs outside the cryostat. Using data from the first year of MicroBooNE operations, several excess noise sources in the TPC were identified and mitigated. The residual equivalent noise charge (ENC) after noise filtering varies with wire length and is found to be below 400 electrons for the longest wires (4.7 m). The response is consistent with the cold electronics design expectations and is found to be stable with time and uniform over the functioning channels. This noise level is significantly lower than previous experiments utilizing warm front-end electronics.Comment: 36 pages, 20 figure
    corecore