321 research outputs found
A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP)
The insider threat problem is extremely challenging to address, as it is committed by insiders who are
trusted and authorized to access the information resources of the organization. The problem is further
complicated by the multifaceted nature of insiders, as human beings have various motivations and
fluctuating behaviours. Additionally, typical monitoring systems may violate the privacy of insiders.
Consequently, there is a need to consider a comprehensive approach to mitigate insider threats. This
research presents a novel insider threat prevention and prediction model, combining several approaches,
techniques and tools from the fields of computer science and criminology. The model is a Privacy-
Preserving, Context-Aware, Insider Threat Prevention and Prediction model (PPCAITPP). The model is
predicated on the Fraud Diamond (a theory from Criminology) which assumes there must be four elements
present in order for a criminal to commit maleficence. The basic elements are pressure (i.e. motive),
opportunity, ability (i.e. capability) and rationalization. According to the Fraud Diamond, malicious
employees need to have a motive, opportunity and the capability to commit fraud. Additionally, criminals
tend to rationalize their malicious actions in order for them to ease their cognitive dissonance towards
maleficence. In order to mitigate the insider threat comprehensively, there is a need to consider all the
elements of the Fraud Diamond because insider threat crime is also related to elements of the Fraud
Diamond similar to crimes committed within the physical landscape.
The model intends to act within context, which implies that when the model offers predictions about threats,
it also reacts to prevent the threat from becoming a future threat instantaneously. To collect information
about insiders for the purposes of prediction, there is a need to collect current information, as the motives
and behaviours of humans are transient. Context-aware systems are used in the model to collect current
information about insiders related to motive and ability as well as to determine whether insiders exploit any
opportunity to commit a crime (i.e. entrapment). Furthermore, they are used to neutralize any
rationalizations the insider may have via neutralization mitigation, thus preventing the insider from
committing a future crime. However, the model collects private information and involves entrapment that
will be deemed unethical. A model that does not preserve the privacy of insiders may cause them to feel
they are not trusted, which in turn may affect their productivity in the workplace negatively. Hence, this
thesis argues that an insider prediction model must be privacy-preserving in order to prevent further
cybercrime. The model is not intended to be punitive but rather a strategy to prevent current insiders from
being tempted to commit a crime in future.
The model involves four major components: context awareness, opportunity facilitation, neutralization
mitigation and privacy preservation. The model implements a context analyser to collect information related
to an insider who may be motivated to commit a crime and his or her ability to implement an attack plan.
The context analyser only collects meta-data such as search behaviour, file access, logins, use of keystrokes
and linguistic features, excluding the content to preserve the privacy of insiders. The model also employs
keystroke and linguistic features based on typing patterns to collect information about any change in an
insiderโs emotional and stress levels. This is indirectly related to the motivation to commit a cybercrime.
Research demonstrates that most of the insiders who have committed a crime have experienced a negative
emotion/pressure resulting from dissatisfaction with employment measures such as terminations, transfers
without their consent or denial of a wage increase. However, there may also be personal problems such as a
divorce. The typing pattern analyser and other resource usage behaviours aid in identifying an insider who
may be motivated to commit a cybercrime based on his or her stress levels and emotions as well as the
change in resource usage behaviour. The model does not identify the motive itself, but rather identifies those
individuals who may be motivated to commit a crime by reviewing their computer-based actions. The model
also assesses the capability of insiders to commit a planned attack based on their usage of computer
applications and measuring their sophistication in terms of the range of knowledge, depth of knowledge and
skill as well as assessing the number of systems errors and warnings generated while using the applications.
The model will facilitate an opportunity to commit a crime by using honeypots to determine whether a
motivated and capable insider will exploit any opportunity in the organization involving a criminal act.
Based on the insiderโs reaction to the opportunity presented via a honeypot, the model will deploy an
implementation strategy based on neutralization mitigation. Neutralization mitigation is the process of
nullifying the rationalizations that the insider may have had for committing the crime. All information about
insiders will be anonymized to remove any identifiers for the purpose of preserving the privacy of insiders.
The model also intends to identify any new behaviour that may result during the course of implementation.
This research contributes to existing scientific knowledge in the insider threat domain and can be used as a
point of departure for future researchers in the area. Organizations could use the model as a framework to
design and develop a comprehensive security solution for insider threat problems. The model concept can
also be integrated into existing information security systems that address the insider threat problemInformation ScienceD. Phil. (Information Systems
์ํฐ์คํผ์ ๊ณ ์ถ์ ์ ์ ์ ๋ค์์ฑ ๋ถ์ ๋ฐ ๊ณ ์ถ์์์ Up ์ ์ ์ ์ฐ๊ด ์ ์ ์์ง๋ ์์ฑ
ํ์๋
ผ๋ฌธ(๋ฐ์ฌ)--์์ธ๋ํ๊ต ๋ํ์ :๋์
์๋ช
๊ณผํ๋ํ ์์ํ๊ณผ,2020. 2. Kang, Byoung Cheorl .์ํฐ์คํผ์ ์ ์ ์ ์ํ์ ๋ณด์กด๋ ๊ณ ์ถ ์ ์ ์์์ ๋ค์์ฑ ์ฐ๊ตฌ์ ๊ณ ์ถ ๊ณผ์ค์ ๊ธฐ์์ ์กฐ์ ํ๋ ์ ์ ์ ์์ธ๋ค์ ์ดํดํ๋ ๊ฒ์ ์ก์ข
์ ์ค์ํ ์ ๋ณด๋ฅผ ์ ๊ณตํ ์ ์๋ค.
์๋ฌผ ์ ์ ์์์ ๋ค์์ฑ์ ๊ตฌ์กฐ์ ๊น์ด๋ฅผ ์ฐ๊ตฌํ๋ ๊ฒ์ ์ด์ฉ๊ฐ๋ฅ ํ ์ ์ ์ ์์์ ์ค์ฉํ์ ๋ณด์กด์ ๋งค์ฐ ํ์์ ์ด๋ค. ์ํฐ์คํผ์์์ ๊ณ ์ถ๋ ๋งค์ฐ ๊ฒฝ์ ์ ์ด๊ณ ์ฌํ์ ์ค์์ฑ์ ๊ฐ์ง ์๋ฌผ์์๋ ๋ถ๊ตฌํ๊ณ , ๋จ์ผ์ผ๊ธฐ๋คํ์ฑ(SNP) ๋ง์ปค๋ฅผ ์ด์ฉํ ์ ์ ์ ๋ค์์ฑ์ ๊ด๋ จํ ์์ธํ ์ฐ๊ตฌ๋ ์ ํ์ ์ด๋ค. ๋ฐ๋ผ์, ์ํฐ์คํผ์ ๊ณ ์ถ ์ ์ ์์์ ๋ค์์ฑ๊ณผ ์ ์ ์ ๊ตฌ์กฐ๋ฅผ ์กฐ์ฌํ๊ธฐ ์ํด, ์ํฐ์คํผ์ ์๋ฌผ๋ค์์ฑ ์ฐ๊ตฌ์์์ ์์งํ๊ณ ์ ์ง๋ ์ด 142 ์ข
์ ๋ํ์ฌ ํ๊ฐํ์๋ค. ์ฐ๋ฆฌ๋ 53,284 genome wide SNP ๋ถ์๋ง์ปค๋ฅผ genotyping-by-sequencing (GBS)๋ฅผ ์ด์ฉํ์ฌ ๋ฐ๊ฒฌํ์ฌ ๊ฒ์ฆํ์๋ค. ์ฐ๋ฆฌ๋ ๋ชจ๋ธ ๊ธฐ๋ฐ์ ์ง๋จ ๊ตฌ์กฐ, ๊ณํต๋, ์ฃผ์ฑ๋ถ ๋ถ์์ ์ฌ์ฉํ์ฌ C. annuum ๊ณผ C. frutescens๋ฅผ ๊ฐ๊ฐ 132์ข
๊ณผ 9์ข
์ ๋ ๊ฐ์ ๋๋ ทํ ์ง๋จ์ผ๋ก ํ์ธํ์๋ค. ์ด ๋ฐ์๋, ์ ์ฅ์ ์ ์ฒด ์ฐ๊ด ๋ถ์ (GWAS) ๊ฒฐ๊ณผ๋ก ๊ณผ์ค, ์ค๊ธฐ, ์ ๊ด๋ จ ํน์ฑ๊ณผ ํฌ๊ฒ ์ฐ๊ด๋ 509๊ฐ์ SNP ๋ง์ปค๋ฅผ ๋ฐ๊ฒฌํ์๋ค. ์ ๋ฐ์ ์ผ๋ก, ์ด ์ฐ๊ตฌ๋ ๋ณด์กด๊ณผ ์ก์ข
์ด๋ผ๋ ๊ด์ ์์ ์ํฐ์คํผ์ ๊ณ ์ถ ์ข
์ ์กด์ฌํ๋ ์ ์ ์ ๋ค์์ฑ์ ์ดํดํ๋๋ฐ ์ ์ฉํ ๊ฒ์ด๋ค.
๊ณ ์ถ์ ๊ณผ์ค๋ฐฉํฅ์์ ๋๊ฐ์ ์ฃผ์ํ ์์ฅ์ผ๋ก, pendant์ upright๊ฐ ์๋ค. ๊ณผ์ค์ Pendant ์ upright ๋ฐฉํฅ ๊ทธ๋ฆฌ๊ณ ๋๋ฌผ๊ฒ ๋ฐ์ํ๋ ์ค๊ฐํ์ ์ง๋จ์ ๊ตฌ์กฐ์ ๋ฐ๋ผ ๊ณผ์ค์ด ๋ฌ๋ฆฌ๊ธฐ ์ ๊ณผ ํ์ ์ฝ๊ฒ ๊ตฌ๋ณ๋์ด์ง๋ ํํํ์ ๊ฐ๋ณ์ฑ์ ํ๋ณํ๋ ๊ฒ์ด๋ค. ๊ณ ์ถ ํต์ฌ ์ง๋จ (core collection)์์ GWAS ๋ถ์์ ํตํ highly significant SNP์ 3๊ฐ์ ์์นํ ์ง๋จ (bi-parental population)์ผ๋ก๋ถํฐ ์ ์ ์๋ฅผ ๋ฐ๊ฒฌํ๋ ๊ฒ์ ์ผ์์ฒด 7๋ฒ์ ์กด์ฌํ๋ ๊ณผ์ค์ ๋ฐฉํฅ์ฑ์ ์กฐ์ ํ๋ ์ ์ ์์ข์ ๋งตํ ๊ตฌ์ญ์ ์ขํ๊ฐ๋ ๊ฒ์ ๊ฐ๋ฅํ๊ฒ ํ๋ค. ์ถ๊ฐ๋ก ๋ถ์ ๋ง์ปค๋ฅผ ๊ฐ๋ฐํ๊ณ , ๊ณผ์ค ๋ฐฉํฅ์ ๊ธฐ์ดํ๋ ํ๋ณด ์ ์ ์๋ฅผ ๋ถ๋ฆฌํ๊ธฐ ์ํด, Capsicum annuum LA F2 mapping population ์ ์ฌ์ฉํ์ฌ fine mapping์ ์ํํ์๋ค. 450 individuals๋ก ๊ตฌ์ฑ๋ LA F2 mapping population์ ์์นํ ๋ผ์ธ์ธ C. annuum LP97 and A79์ ๊ต๋ฐฐ๋ฅผ ํตํด ๊ฐ๋ฐ๋์๋ค. ์ ์ ์ ๋ถ์ ๊ฒฐ๊ณผ ์ํฅ ๊ณผ์ค ๋ฐฉํฅ์ ํฌํํ์ ๋จ์ผ ์ด์ฑ ์ ์ ์ Up์ ์ํ์ฌ ์กฐ์ ๋จ์ ๋ํ๋๋ค. Up ์ ์ ์์ข์ fine mapping์ ์ํด 150๊ฐ์ SNP ๋ถ์๋ง์ปค๊ฐ ์ฌ์ฉ๋์๋ค. ์ ์ ์ ๋ถ์ ๊ฒฐ๊ณผ ์ํฅ ๊ณผ์ค ๋ฐฉํฅ์ ํฌํํ์ ๋จ์ผ ์ด์ฑ ์ ์ ์ Up์ ์ํ์ฌ ์กฐ์ ๋จ์ ๋ํ๋๋ค. Up ์ ์ ์์ข์ fine mapping์ ์ํด 150๊ฐ์ SNP ๋ถ์๋ง์ปค๊ฐ ์ฌ์ฉ๋์๋ค. ์ด ๋๊ฐ์ ๋ง์ปค ์์ด์CM334 ์ ์ ์ฒด์ ์ ๋ ฌ๋์์ผ๋ฉฐ, Up ์ ์ ์์ข๋ 101kb genomic region์ผ๋ก ๊ตฌ๋ถ๋์๋ค. ๋์ ์ง์ญ์์ 13๊ฐ์ ํ๋ณด์ ์ ์๊ฐ ์์ธก๋์๋ค. ํ๋ณด์ ์ ์์ CDS ์์ญ์ธ Zinc finger MYM-type protein 1-like๋ 66๊ณผ 75 ์์น์ ๋ ๊ฐ์ ๋น ๋์ ์ผ๊ธฐ์นํ๊ณผ, ์ฒซ๋ฒ์งธ ๋ดํด๋ ์คํ์ด๋์ 104bp ์์ 104b์์ ํ ๊ฐ์ ์ผ๊ธฐ ๊ฒฐ์ค์ ๋ํ๋ด์๋ค. ์ด๋ฌํ ๋์ฐ๋ณ์ด๋ 12๊ฐ์ parental line๊ณผ 5๊ฐ์ ์ข
์์ ์ผ๊ด๋๊ฒ ๊ด์ฐฐ๋์๋ค. ๋ฐ๋ผ์ ์ด ์ ์ ์๋ Up ์ ์ ์์ข์ ๋งค์ฐ ์ ๋ ฅํ ํ๋ณด์ ์ ์์๋ค. ์ด ์ฐ๊ตฌ๋ฅผ ํตํด ์ป์ ์ ๋ณด๋ ๋ถ์ํ์ง ๊ธฐ๋ฐ ์ ๋ฐ์ ํตํ์ฌ ์กฐ๊ธฐ ๊ณผ์ค ๋ฐฉํฅ ๊ฒฐ์ ์ผ๋ก ๊ณ ์ถ ํ์ข
์ ํน์ฑ๊ณผ ์ก์ข
์ ๋ํ ์ถ๊ฐ ์ฐ๊ตฌ๋ฅผ ์ด์งํ ๊ฒ์ด๋ค.Diversity study of Capsicum germplasms preserved in the Ethiopian Gene bank and understanding genetic factors that controls the fruit orientation in pepper can provide important information for breeding.
Investigating the extent and structure of crop germplasm diversity is essential for the conservation and utilization of the available genetic resources. Despite the great economic and social importance of pepper in Ethiopia, detailed studies of the genetic diversity using single nucleotide polymorphism (SNP) markers is limited. Thus, with the objective of investigating the variability and genetic structure of Ethiopian pepper germplasms, a total of 142 accessions which were collected and maintained by the Ethiopian Biodiversity Institute were evaluated. We identified and validated 53,284 genome wide SNP molecular markers using genotyping-by-sequencing (GBS). Employing model based population structure, phylogenetic tree and principal coordinate analysis, we identified C. annuum and C. frutescens as two distinct genetic populations with 132 and 9 accessions, respectively. Besides this, genome wide association (GWAS) analysis detected 509 SNP markers that were significantly associated with fruit, stem and leaf-related traits. Overall, this report is useful to understand the genetic variability existed in Ethiopian Capsicum species, for its conservation and breeding.
There are specific known markets for the two major fruit orientation in pepper, i.e. pendant and upright. Pendant and upright position with rare occurrence of intermediate orientation of pepper fruit is a distinguishing morphological variability that can be easily recognized before or after the fruit is set, depending on the population types. Identification of genes from three different bi-parental populations and highly significant SNP positions from GWAS analysis of Capsicum core collection enable us to narrow down the mapping region of fruit orientation controlling the locus in chromosome 12. To further develop molecular markers and isolate the candidate gene underlying fruit orientation, fine mapping was performed using Capsicum annuum LA F2 mapping population. The LA F2 mapping population consisting of 450 individuals was developed from the cross between parental lines C. annuum LP97 and A79. Genetic analysis revealed that the phenotype of the up fruit orientation was controlled by a single recessive gene, Up. One hundred fifty SNP markers were used for fine mapping of the Up locus. High-resolution genetic mapping of these markers in Karia F2 mapping population placed Redu0119 and SAR201-1386 at genetic distances of 0.8 and 0.6 cM, respectively, on either side of the Up locus. These two marker sequences were aligned to the CM334 genome and the Up locus was delimited to a 101 kb genomic region. Fifteen candidate genes were predicted in the target region. Overall, there were a total of 31 conservative amino acid substitutions, due to 18 non-synonymous and 13 synonymous nucleotide switches. The first CDS region of the candidate gene, Zinc finger MYM-type protein 1-like has displayed one non-synonymous nucleotide substitution at 106 bp and one nucleotide deletion at 104 bp. Therefore, Zinc finger MYM-type protein 1-like was the most likely candidate gene for the Up locus. The information obtained here will facilitate further research on the trait and breeding of pepper varieties with the early determination of fruit orientation through marker-assisted selection.GENERAL INTRODUCTION 1
CHAPTER I Genetic Diversity of Ethiopian Capsicum spp 12
ABSTRACT 13
INTRODUCTION 15
MATERIALS AND METHODS 20
Plant materials 20
Morphological characterization and statistical analysis 23
DNA extraction and library construction for genotyping by sequencing 24
HRM-PCR amplification and data analysis 25
Sequencing data analysis, SNP identification and genome-wide association analysis 28
Genetic diversity and population structure analysis 29
Phylogenetic and principal-coordinate analyses 30
RESULTS 31
Species identification based on HRM genotyping 31
Qualitative and quantitative morphological characterization 33
GBS and single-nucleotide polymorphisms 41
Genetic diversity 44
Analysis of molecular variance 46
Population structure 48
Molecular phylogenetic and principal-coordinate analysis 50
GWAS for selected traits 52
DISCUSSION 61
REFERENCES 67
CHAPTER II Fine mapping of the Up gene controlling fruit orientation in pepper (Capsicum spp.) 76
ABSTRACT 77
INTRODUCTION 79
MATERIALS AND METHODS 82
Plant materials 82
Growing conditions and phenotyping 82
Light microscopic observation 83
Genomic DNA extraction 83
Genotyping-by-sequencing 84
Development of SNP markers and linkage analysis of molecular markers 84
PCR amplification and localization of the Up gene 86
Gene cloning and sequencing 87
RESULTS 89
Fruit orientation in pepper and its temporal change 89
Pedicel morphology in segregation population and its correlation with other related traits 90
Inheritance analysis of fruit position 91
Localization of the target region for Up locus 100
Fine-mapping of Up locus and validation of markers 107
Confirmation of sequence variations in candidate genes 113
Phylogenic analysis 122
DISCUSSION 124
REFERENCES 130
ABSTRACT IN KOREAN 137Docto
Gastrointestinal helminths and their predisposing factors in different poultry management systems; Haromaya, Ethiopia
Among several diseases, gastrointestinal parasites affect poultry production through retarded growth and reduced productivity. The severity varies according to management system and associated predisposing factors. Epidemiology of chicken gastrointestinal helminths were studied using coprological and necropsy examination, with the objectives to estimate the prevalence, identify species of helminths and associated predisposing factors in Haromaya town from November 2011 to April 2012. Fecal samples from selected chicken were collected from both intensive and extensive farms. Coprological examination on 384 chicken and 24 post mortem examinations were conducted. Out of 384 samples examined, 51.8% were positive of which a high prevalence of 110(28.6%) Ascaridia galli followed by 33(8.6%) of Heterakis gallinarum, 11(2.8%) of Raillietina species and 44(11.5%) mixed infection were recovered. Factors for the occurrence of GIT helminths were investigated using logistic regression models; where each assumed predisposing factor analyzed using uni-variable and followed by multi-variable logistic regression to determine the interaction and power of influence among factors. Accordingly, statistically significant difference (p<0.05) was observed when prevalence of helminths compared with breed, sex, age and management system separately using univariable logistic regression; whereas, when all predisposing factors subjected together using multi-variable backward stepwise analysis, it showed that the odds of local, Fayoumi and White Leghorn breeds had odds of (OR= 6.4, 50.8 and 6.9) more likely to be affected than Bovan Brown breed with significant difference (p<0.05). Male birds were 1.9 times more likely to be affected than female birds and birds in extensive management system were 2.8 times more likely to be affected than intensive farming system. The study indicated that ย gastrointestinal (GIT) helminths were more prevalent in extensive management system than in intensive management system, the finding was associated with poor management system or due to poor bio-security. Therefore, there is a need to improve hygienic situation, especially in area where extensive management system prevails.Keywords: Gastrointestinal; Haromaya; Helminths; Poultry; Production system
The nominal group technique for participating communities in analyzing rural town water and sanitation situation
Abstract:
To explore sanitation problems and their causes, a series of independent group discussions was conducted with residents of a rural town stratified into seven social levels using the Nominal Group [Discussion] Technique (NGT). Indiscriminate open field defecation and garbage disposal were the two most mentioned and ranked problem items followed by unsanitary food and drink services. The top identified cause items were absence of public latrines, failure of the municipality to control town sanitation and absence of solid waste disposal facilities. A Combined group gave the highest Median Agreement Score (MAS) of 10. The smallest median agreement was scored by Youth and Health workers' groups (MAS=6.5) for mentioned, and by youth and Ordinary residents'groups (MAS=4.5) for ranked problem items. Health workers' group (group 7) ranked MAS of 5. The MAS for causes of sanitation problems of the Combined group was 8 for mentioned, and MAS of 4 for ranked items. Development workers ought to give due recognition to communal stratification when making need assessment for better realignment of diverse view points and interests during project development. Modifying and validating NGT for a broader use in assessing community health problems and needs is suggested. [Ethiop. J. Health Dev. 1997;11(1):37-42
- โฆ