507 research outputs found

    Investigation of open resolvers in DNS reflection DDoS attacks

    Get PDF
    Les serveurs du systĂšme de noms de domaine (DNS) reprĂ©sentent des Ă©lĂ©ments clĂ©s des rĂ©seaux Internet. RĂ©cemment, les attaquants ont profitĂ© de ce service pour lancer des attaques massives de dĂ©ni de service distribuĂ© (DDoS) contre de nombreuses organisations [1, 2, 3]. Ceci est rendu possible grĂące aux diffĂ©rentes vulnĂ©rabilitĂ©s liĂ©es Ă  la conception, implantation ou une mauvaise configuration du protocole DNS. Les attaques DDoS amplifiĂ©es par DNS sont des menaces dangereuses pour les utilisateurs d’Internet. L’objectif de cette Ă©tude est d’acquĂ©rir une meilleure comprĂ©hension des attaques DDoS amplifiĂ©es par DNS par l’investigation des rĂ©solveurs DNS ouverts Ă  travers le monde. Dans ce contexte, il est nĂ©cessaire d’adopter une approche en phase prĂ©coce pour dĂ©tecter les rĂ©solveurs DNS ouverts. Cela devient cruciale dans le processus d’enquĂȘte. Dans cette thĂšse, nous nous intĂ©resserons Ă  l’utilisation de rĂ©solveurs DNS ouverts dans les attaques DDoS amplifiĂ©es par DNS. Plus prĂ©cisĂ©ment, la principale contribution de notre recherche est la suivante : (i) Nous profilons les rĂ©solveurs DNS ouverts, ce qui implique : dĂ©tecter les rĂ©solveurs ouverts, les localiser, dĂ©tecter leur systĂšme d’exploitation et le type de leur connectivitĂ©, et Ă©tudier le but de leur vivacitĂ©. (ii) Nous effectuons une Ă©valuation de la sĂ©curitĂ© des rĂ©solveurs DNS ouverts et leurs vulnĂ©rabilitĂ©s. De plus, nous discutons les fonctions de sĂ©curitĂ© des rĂ©solveurs DNS, qui fournissent, par inadvertence, les attaquants par la capacitĂ© d’effectuer des attaques DDoS amplifiĂ©es par DNS. (iii) Nous prĂ©sentons une analyse pour dĂ©montrer l’association des rĂ©solveurs DNS ouverts avec les menaces de logiciels malveillants.Domain Name System (DNS) servers represent key components of Internet networks. Recently, attackers have taken advantage of this service to launch massive Distributed Denial of Service (DDoS) attacks against numerous organizations [1, 2, 3]. This is made possible due to the various vulnerabilities linked to the design, implementation or misconfiguration of the DNS protocol. DNS reflection DDoS attacks are harmful threats for internet users. The goal of this study is to gain a better understanding of DNS reflection DDoS attacks through the investigation of DNS open resolvers around the world. In this context, there is a need for an early phase approach to detect and fingerprint DNS open resolvers. This becomes crucial in the process of investigation. In this thesis, we elaborate on the usage of DNS open resolvers in DNS reflection DDoS attacks. More precisely, the main contribution of our research is as follows : (i) We profile DNS open resolvers, which involves : detecting open resolvers, locating them, fingerprinting their operating system, fingerprinting the type of their connectivity, studying the purpose of their liveness. (ii) We conduct an assessment with respect to DNS open resolvers security and their vulnerabilities. Moreover, we discuss the security features that DNS open resolvers are equipped with, which inadvertently provide the capability to the attackers in order to carry out DNS reflection DDoS attacks. (iii) We present an analysis to demonstrate the association of DNS open resolvers with malware threats

    Critique of Yusuf Haddad's Doubts About the Existence of Contradictions in the Verses of the Qur'an

    Get PDF
    One of the miraculous aspects of the Qur'an that has been considered by thinkers since the beginning of Islam is its miracle in the guise of difference and the absence of contradiction. Due to a superficial analysis of the contents of the verses and the lack of correct principles and rules in the interpretation of the Qur'an, some Orientalists have been under the illusion of contradiction and have made contradictions about the Qur'an. One of them is Yusuf Haddad, who has attributed the existence of contradictions to the Qur'an, such as the creation of the earth and the sky, and the questioning or non-questioning on the Day of Judgment. In this article, while examining the doubts raised by him, he tries to state that the existence of any discrepancy and contradiction in the verses of the Holy Quran is nothing more than an illusion and the apparent contradiction that can be seen in the verses of the Holy Quran is removed with a little care and reflection

    The Influence Of Neuroticism On Stress Perception And Its Resultant Negative Affect

    Get PDF
    There is contemporary literature reporting the role of the neuroticism (N) personality type in the stress process. People with elevated neuroticism experience more interpersonal stressors, perceive daily events as more negative, and use maladaptive ways to combat stressors. This thesis explores the influence of neuroticism on stress perception and the associated negative affect. In the current study, mood and stress perception of pre-screened college students who scored high and low on the neuroticism subscale were manipulated, with a laboratory psycho-social stressor, after their moods were initially neutralized to their respective base levels. Later, their mood and stress perception were manipulated again through exposure to positive stimuli. The results indicated that the participants in the high neuroticism group had significantly higher base levels of stress and negative affect, as compared to the participants in the low neuroticism group. After the participants were exposed to positive stimuli, the mean stress and negative affect scores of the high neuroticism group were equivalent to its base level mean stress and negative affect scores. However, both groups showed similar increases in their stress perception and negative affect scores during the stress task. Implications and limitations of the study are discussed

    Investigation of association of Helicobacter pylori and simple nasal polyps

    Get PDF
    Objective: To investigate a possible contribution of Helicobacter pylori (H. Pylori) in the etiopathogenesis of simple nasal polyps. Study Design: Prospective clinical trial. Methods: Twenty five patients with simple nasal polyps underwent nasal polypectomy were studied. Helicobacter pylori DNA was investigated for specimens removed from those patients by using polymerase chain reaction (PCR). Results: Helicobacter pylori DNA was detected in 2 (8%) of total 25 specimens. Conclusion: We could not find strong indicator that H. pylori played a role at the tissue level in the pathogenesis of nasal polyp. Keywords: Nasal polyp - Helicobacter pylori Polymerase chain reaction.Sudan Journal of Medical Sciences Vol. 3 (2) 2008: pp. 95-9

    Kas ir patiesība? Ēriha Fromma modelis

    Get PDF
    Rakstā aplĆ«koti divi patiesÄ«bas interpretācijas ceÄŒi, ko piedāvā Ērihs Fromms: absolĆ«tā patiesÄ«ba un optimālā patiesÄ«ba. Fromma idejas ir aktuālas tad, kad problēmām ir vajadzÄ«gs nevis teorētisks skaidrojums, bet praktisks risinājums. Fromma pragmatiski ievirzÄ«tā optimālā patiesÄ«ba ir tieĆĄi tas, ko izteic tās nosaukums – optimāla. Tas nenozÄ«mē, ka tā ir vienÄ«gā, labākā vai pareizākā, bet gan to, ka ƥādai patiesÄ«bai piemÄ«t lietojums

    Flash Fiction: A Unique Writer-Reader Partnership

    Get PDF
    The proliferation of an unconventional miniature story, in the digital age, is a testament to its rising popularity. In response to the expanding demand for very short stories, writers have delivered the briefest possible stories falling under the short-short fiction umbrella. Short-short fiction is identified with various labels; however, flash fiction is more commonly used in America. The term ‘flash fiction’ was initially used for short-short stories of up to 750 words. However, since then, stories ranging from 50 words to 1,500 words have also been included in the classification of the flash fiction genre. Flash fiction is a hybrid style that mixes verse with narrative to form a story that captures a ‘moment’ of a larger narrative sequence akin to a series of still photographs taken from a movie. Flash Fiction is not plot driven and precisely includes only essential information in a compressed manner. Flash fiction writers deliberately sketch scenes with strokes of ambiguity to keep readers fully attuned to each word. They also withhold details regarding the story’s characters, events, scenes, and atmosphere that watchful readers try to compensate with an active imagination. Apparently, the readers also are inclined towards making sense of each word based on their individual experiences and perceptions. Typically ending with an ironic twist, flash fiction’s ending surprises the readers and leaves them stimulated that encourages multiple re-readings for closure. This paper argues that flash fiction uniquely draws the reader into a partnership with the writer and it is with their combined contribution that the story is completed and remains memorable

    A Pyrrhic Victory: Harold Wilson, Helmut Schmidt, and the British Renegotiation of EC Membership, 1974–5

    Get PDF
    Britain’s renegotiation of EC membership in 1974-5 has commonly been praised by historians as a tactical masterpiece by Prime Minister Harold Wilson in holding a divided country and party together while also keeping Britain inside the European Community. By contrast, this article focuses on the detrimental effect the episode had on Britain’s standing inside the EC. Using the prism of high-level diplomacy between Wilson and the German Chancellor Helmut Schmidt, it reconstructs precisely the changes in German perceptions of British positions, showing how initial goodwill towards Britain’s demands soon gave way to widespread scepticism over British motives and ultimate intentions. While highlighting the strong domestic pressures driving Britain and Germany apart, the article ultimately argues that these differences were unnecessarily exacerbated by Wilson’s failure at personal diplomacy on the highest level. A different handling of Schmidt may not have resulted in a radically different outcome of the renegotiations; but it may well have avoided the profound sense of distrust and suspicion over Britain’s future role in Europe that the episode stimulated among the Germans. The article is based on recently declassified sources from three countries, as well as on rare materials from Schmidt’s private archive in Hamburg.This is the author accepted manuscript. The final version is available from Taylor & Francis via http://dx.doi.org/10.1080/07075332.2014.98533

    Emphysematous Cystitis along with Emphysematous Pyelonephritis in Type II Diabetes: A Case Report

    Get PDF
    Emphysematous urinary tract infections (UTIs) are infections of the lower or upper urinary tract associated with gas formation. They may manifest as cystitis, pyelitis, or pyelonephritis. Diabetes mellitus is a major risk factor for these infections. The diagnosis of gas-forming UTI is usually made by plain films of the abdomen and/or computed tomography (CT). Escherichia coli and Klebsiella pneumonia are the predominant etiologic organisms. We present a rare case of emphysematous cystitis along with emphysematous pyelonephritis in a patient with poorly controlled diabetes. This patient underwent nephrectomy and 500 ml of puss was drained before nephrectomy. Puss C/S showed growth of Escherichia coli which was sensitive to pipercillin/tazobactam. We conclude that all female diabetic patients more than 60 years of age presenting with urinary symptoms, abdominal pain, fever and evidence of UTI on urine routine examination should have at-least an ultrasound abdomen and kidney ureter bladder (KUB) done and if presence of air is suspected, these patients should get CT scan KUB done so that diagnosis of emphysematous UTI be made and managed accordingly

    A new method for university instructor assessment

    Get PDF
    Preparing enterprise architecture is complicated procedure, which uses framework as structure regularity and style as the behavior director for controlling complexity. As in architecture behavior, precedence over structure, for better diagnosis of a behavior than other behaviors, there is a need to evaluate the architecture performance. Enterprise architecture cannot be organized without the benefit of the logical structure. Framework provides a logical structure for classifying architectural output. Among the common architectural framework, the C4ISR is one of the most appropriate frameworks because of the methodology of its production and the level of aggregation capability and minor revisions. C4ISR framework, in three views and by using some documents called product, describes the architecture. In this paper, for developing the systems, there are always uncertainties in information systems and we may use new version of UML called FUZZY-UML, which includes structure and behavior of the system. The proposed model of this paper also uses Fuzzy Petri nets to analyze the developed system

    An Assorted Design for Joint Monitoring of Process Parameters: An Efficient Approach for Fuel Consumption

    Get PDF
    Due to high fuel consumption, we face the problem of not only the increased cost, but it also affects greenhouse gas emission. This paper presents an assorted approach for monitoring fuel consumption in trucks with the objective to minimize fuel consumption. We propose a control charting structure for joint monitoring of mean and dispersion parameters based on the well-known max approach. The proposed joint assorted chart is evaluated through various performance measures such as average run length, extra quadratic loss, performance comparison index, and relative average run length. The comparison of the proposed chart is carried out with existing control charts, including a combination of X and S, the maximum exponentially weighted moving average (Max-EWMA), combined mixed exponentially weighted moving average-cumulative sum (CMEC), maximum double exponentially weighted average (MDEWMA), and combined mixed double EWMA-CUSUM (CMDEC) charts. The implementation of the proposed chart is presented using real data regarding the monitoring of fuel consumption in trucks. The outcomes revealed that the joint assorted chart is very efficient to detect different kinds of shifts in process behaviors and has superior performance than its competitor charts.Deanship of Scientific Research, King Saud University, King Fahd University of Petroleum and MineralsScopu
    • 

    corecore