18 research outputs found

    Increasing Structured P2P Protocol Resilience to Localized Attacks

    Get PDF
    The Peer-to-Peer (P2P) computing model has been applied to many application fields over the last decade. P2P protocols made their way from infamous - and frequently illicit - file sharing applications towards serious applications, e.g., in entertainment, audio/video conferencing, or critical applications like smart grid, Car-2-Car communication, or Machine-to-Machine communication. Some of the reasons for that are P2P's decentralized design that inherently provides for fault tolerance to non-malicious faults. However, the base P2P scalability and decentralization requirements often result in design choices that negatively impact their robustness to varied security threats. A prominent vulnerability are Eclipse attacks (EA) that aim at information hiding and consequently perturb a P2P overlay's reliable service delivery. This dissertation provides the necessary background to understand the different types and inherent complexity of EAs, the susceptibility of many P2P protocols to EAs, and a mitigation technique for the localized EA variant. The applicability of the proposed mitigation technique has been validated experimentally and shows for a wide range of system parameters and application scenarios good mitigation rates reaching up to 100%

    Emodepside targets SLO-1 channels of Onchocerca ochengi and induces broad anthelmintic effects in a bovine model of onchocerciasis

    Get PDF
    Onchocerciasis (river blindness), caused by the filarial worm Onchocerca volvulus, is a neglected tropical disease mostly affecting sub-Saharan Africa and is responsible for >1.3 million years lived with disability. Current control relies almost entirely on ivermectin, which suppresses symptoms caused by the first-stage larvae (microfilariae) but does not kill the long-lived adults. Here, we evaluated emodepside, a semi-synthetic cyclooctadepsipeptide registered for deworming applications in companion animals, for activity against adult filariae (i.e., as a macrofilaricide). We demonstrate the equivalence of emodepside activity on SLO-1 potassium channels in Onchocerca volvulus and Onchocerca ochengi, its sister species from cattle. Evaluation of emodepside in cattle as single or 7-day treatments at two doses (0.15 and 0.75 mg/kg) revealed rapid activity against microfilariae, prolonged suppression of female worm fecundity, and macrofilaricidal effects by 18 months post treatment. The drug was well tolerated, causing only transiently increased blood glucose. Female adult worms were mostly paralyzed; however, some retained metabolic activity even in the multiple high-dose group. These data support ongoing clinical development of emodepside to treat river blindness

    Increasing Structured P2P Protocol Resilience to Localized Attacks

    No full text
    The Peer-to-Peer (P2P) computing model has been applied to many application fields over the last decade. P2P protocols made their way from infamous - and frequently illicit - file sharing applications towards serious applications, e.g., in entertainment, audio/video conferencing, or critical applications like smart grid, Car-2-Car communication, or Machine-to-Machine communication. Some of the reasons for that are P2P's decentralized design that inherently provides for fault tolerance to non-malicious faults. However, the base P2P scalability and decentralization requirements often result in design choices that negatively impact their robustness to varied security threats. A prominent vulnerability are Eclipse attacks (EA) that aim at information hiding and consequently perturb a P2P overlay's reliable service delivery. This dissertation provides the necessary background to understand the different types and inherent complexity of EAs, the susceptibility of many P2P protocols to EAs, and a mitigation technique for the localized EA variant. The applicability of the proposed mitigation technique has been validated experimentally and shows for a wide range of system parameters and application scenarios good mitigation rates reaching up to 100%

    QScope - Metriken formulieren, berechnen und visualisieren

    No full text

    QScope - Metriken formulieren, berechnen und visualisieren

    No full text

    Protection of SCADA Communication Channels

    No full text

    Threat Modeling and Dynamic Profiling

    No full text
    corecore