360 research outputs found

    Detection of Gray Hole Attack in Software Defined Networks

    Get PDF
    Gray Hole Attack is an advanced transformation of black hole attack. Both of them are a common type of attack in Wireless Sensor Network (WSN). Malicious nodes may constantly or randomly drop packets and therefore reduce the efficiency of the networking system. Furthermore Software Define Network (SDN) has been highly developed in recent years. In this type of networks switch/router functionality is separated into the control plane and data plane. Network managers can select control policies and build operating rules according to their own preferences. In addition, network protocols and packet fields are also programmable. Because the switch/router only implements the data transmission and executes the switching/routing decisions based on commends coming from control plane. Compromised switches/routers themselves or malicious control instructions both can result in selectively dropped packets. This makes a gray hole attack possible in the infrastructure of SDN. Therefore, this paper would like to discuss time-base and random-base gray hole attack in SDN, and then propose a useful detection method based on weighted K-Nearest Neighbor (KNN) and Genetic Algorithm (GA). The simulation data collected from switches/routers indicate that our method does demonstrate pretty good performance

    Modeling the dynamics of bivalent histone modifications

    Full text link
    Epigenetic modifications to histones may promote either activation or repression of the transcription of nearby genes. Recent experimental studies show that the promoters of many lineage-control genes in stem cells have "bivalent domains" in which the nucleosomes contain both active (H3K4me3) and repressive (H3K27me3) marks. It is generally agreed that bivalent domains play an important role in stem cell differentiation, but the underlying mechanisms remain unclear. Here we formulate a mathematical model to investigate the dynamic properties of histone modification patterns. We then illustrate that our modeling framework can be used to capture key features of experimentally observed combinatorial chromatin states.Comment: 23 pages, 10 figure

    AN APPROACH TO RISK MANAGEMENT FOR E-COMMERCE

    Get PDF
    Today’s trend of online shopping proves the vital role e-commerce plays in our daily life. Online transactions require reliable networks, and reliable networks depend on secure information technology. These networks have many advantages, but they have disadvantages as well—notably, the need for risk management. The growing importance of e-commerce, with its associated need to ensure trust in online transactions, has led the authors to study and propose risk management in e-commerce from a holistic perspective, thus enabling the implementation of real-time auditing of e-commerce transactions using the digital agents’ technology. In this paper, the authors discuss e-commerce’s risks and present a methodology that can be used to manage those risks. It concludes that e-commerce risks are a high priority for online businesses, and that many of the requisite controls are extensions of controls for managing risk in other information systems

    Replication Attack Detection in Mobile Wireless Sensor Network with LEACH-ME Routing Protocol

    Get PDF
    Because the Wireless Sensor Network (WSN) nodes are low-cost devices, attackers may capture some nodes in this network and then duplicate these nodes to eavesdrop the transmitted messages or even control the network gradually without difficulty. This is the so-called node replication attack. This type of attacks could cause the huge threat to information security of WSNs. Therefore, in this paper, we would like to suggest a detection approach which can offer good performance but with higher energy consumption. Hence, it can provide an alternative solution for some specific applications that need better precision but do not care energy or lifespan too much

    Regret Avoidance as a Measure of DSS Success

    Get PDF

    Special Issue in Honor of Prof. Ting-Peng Liang’s Lifetime Contribution to the Service Innovation Discipline

    Get PDF
    This special issue is dedicated to the reminiscences of TP for his significant contributions to the global IS discipline. This PAJAIS special issue solicits research submissions that are related to the Service Innovation discipline, one of TP’s key areas of research. Since service-oriented economy is evolving into experience economy, the research topics regarding how to design products, services, information systems, and mobile services to increase users’ experience value are becoming more and more important. From a service logic perspective, innovative service design focus on how they change customer thinking, participation, and capabilities to co-create value rather than new features in order to enhance user experience. Hence, this special issue focuses on issues related to service innovation, service quality & user experience (UX)

    DNA Binding and Degradation by the HNH Protein ColE7

    Get PDF
    The bacterial toxin ColE7 bears an HNH motif which has been identified in hundreds of prokaryotic and eukaryotic endonucleases, involved in DNA homing, restriction, repair, or chromosome degradation. The crystal structure of the nuclease domain of ColE7 in complex with a duplex DNA has been determined at 2.5 Å resolution. The HNH motif is bound at the minor groove primarily to DNA phosphate groups at and beyond the 3′ side of the scissile phosphate, with little interaction with ribose groups and bases. This result provides a structural basis for sugar- and sequence-independent DNA recognition and the inhibition mechanism by inhibitor Im7, which blocks the substrate binding site but not the active site. Structural comparison shows that two families of endonucleases bind and bend DNA in a similar way to that of the HNH ColE7, indicating that endonucleases containing a “ββα-metal” fold of active site possess a universal mode for protein-DNA interactions

    Device-independent verification of Einstein-Podolsky-Rosen steering

    Full text link
    If the presence of entanglement could be certified in a device-independent (DI) way, it is likely to provide various quantum information processing tasks with unconditional security. Recently, it was shown that a DI protocol, combining measurement-device-independent techniques with self-testing, is able to verify all entangled states, however, it imposes demanding requirements on its practical implementation. Here, we present a less-demanding protocol based on Einstein-Podolsky-Rosen (EPR) steering, which is achievable with current technology. Particularly, we first establish a complete framework for DI verification of EPR steering and show that all steerable states can be verified. Then, we analyze the three-measurement setting case, allowing for imperfections of self-testing. Finally, a four-photon experiment is implemented to device-independently verify EPR steering and to further demonstrate that even Bell local states can be faithfully verified. Our findings pave the way for realistic applications of secure quantum information tasksComment: 6+8 pages; Comments are welcom

    Probing internal bath dynamics by a Rabi oscillator-based detector

    Full text link
    By exact numerical and master equation approaches, we show that a central spin-1/2 can be configured to probe internal bath dynamics. System-bath interactions cause Rabi oscillations in the detector and periodic behavior of fidelity. This period is highly sensitive to the strength of the bath self-interactions, and can be used to calculate the intra-bath coupling
    • …
    corecore