20 research outputs found

    Decision Support Elements and Enabling Techniques to Achieve a Cyber Defence Situational Awareness Capability

    Full text link
    [ES] La presente tesis doctoral realiza un análisis en detalle de los elementos de decisión necesarios para mejorar la comprensión de la situación en ciberdefensa con especial énfasis en la percepción y comprensión del analista de un centro de operaciones de ciberseguridad (SOC). Se proponen dos arquitecturas diferentes basadas en el análisis forense de flujos de datos (NF3). La primera arquitectura emplea técnicas de Ensemble Machine Learning mientras que la segunda es una variante de Machine Learning de mayor complejidad algorítmica (lambda-NF3) que ofrece un marco de defensa de mayor robustez frente a ataques adversarios. Ambas propuestas buscan automatizar de forma efectiva la detección de malware y su posterior gestión de incidentes mostrando unos resultados satisfactorios en aproximar lo que se ha denominado un SOC de próxima generación y de computación cognitiva (NGC2SOC). La supervisión y monitorización de eventos para la protección de las redes informáticas de una organización debe ir acompañada de técnicas de visualización. En este caso, la tesis aborda la generación de representaciones tridimensionales basadas en métricas orientadas a la misión y procedimientos que usan un sistema experto basado en lógica difusa. Precisamente, el estado del arte muestra serias deficiencias a la hora de implementar soluciones de ciberdefensa que reflejen la relevancia de la misión, los recursos y cometidos de una organización para una decisión mejor informada. El trabajo de investigación proporciona finalmente dos áreas claves para mejorar la toma de decisiones en ciberdefensa: un marco sólido y completo de verificación y validación para evaluar parámetros de soluciones y la elaboración de un conjunto de datos sintéticos que referencian unívocamente las fases de un ciberataque con los estándares Cyber Kill Chain y MITRE ATT & CK.[CA] La present tesi doctoral realitza una anàlisi detalladament dels elements de decisió necessaris per a millorar la comprensió de la situació en ciberdefensa amb especial èmfasi en la percepció i comprensió de l'analista d'un centre d'operacions de ciberseguretat (SOC). Es proposen dues arquitectures diferents basades en l'anàlisi forense de fluxos de dades (NF3). La primera arquitectura empra tècniques de Ensemble Machine Learning mentre que la segona és una variant de Machine Learning de major complexitat algorítmica (lambda-NF3) que ofereix un marc de defensa de major robustesa enfront d'atacs adversaris. Totes dues propostes busquen automatitzar de manera efectiva la detecció de malware i la seua posterior gestió d'incidents mostrant uns resultats satisfactoris a aproximar el que s'ha denominat un SOC de pròxima generació i de computació cognitiva (NGC2SOC). La supervisió i monitoratge d'esdeveniments per a la protecció de les xarxes informàtiques d'una organització ha d'anar acompanyada de tècniques de visualització. En aquest cas, la tesi aborda la generació de representacions tridimensionals basades en mètriques orientades a la missió i procediments que usen un sistema expert basat en lògica difusa. Precisament, l'estat de l'art mostra serioses deficiències a l'hora d'implementar solucions de ciberdefensa que reflectisquen la rellevància de la missió, els recursos i comeses d'una organització per a una decisió més ben informada. El treball de recerca proporciona finalment dues àrees claus per a millorar la presa de decisions en ciberdefensa: un marc sòlid i complet de verificació i validació per a avaluar paràmetres de solucions i l'elaboració d'un conjunt de dades sintètiques que referencien unívocament les fases d'un ciberatac amb els estàndards Cyber Kill Chain i MITRE ATT & CK.[EN] This doctoral thesis performs a detailed analysis of the decision elements necessary to improve the cyber defence situation awareness with a special emphasis on the perception and understanding of the analyst of a cybersecurity operations center (SOC). Two different architectures based on the network flow forensics of data streams (NF3) are proposed. The first architecture uses Ensemble Machine Learning techniques while the second is a variant of Machine Learning with greater algorithmic complexity (lambda-NF3) that offers a more robust defense framework against adversarial attacks. Both proposals seek to effectively automate the detection of malware and its subsequent incident management, showing satisfactory results in approximating what has been called a next generation cognitive computing SOC (NGC2SOC). The supervision and monitoring of events for the protection of an organisation's computer networks must be accompanied by visualisation techniques. In this case, the thesis addresses the representation of three-dimensional pictures based on mission oriented metrics and procedures that use an expert system based on fuzzy logic. Precisely, the state-of-the-art evidences serious deficiencies when it comes to implementing cyber defence solutions that consider the relevance of the mission, resources and tasks of an organisation for a better-informed decision. The research work finally provides two key areas to improve decision-making in cyber defence: a solid and complete verification and validation framework to evaluate solution parameters and the development of a synthetic dataset that univocally references the phases of a cyber-attack with the Cyber Kill Chain and MITRE ATT & CK standards.Llopis Sánchez, S. (2023). Decision Support Elements and Enabling Techniques to Achieve a Cyber Defence Situational Awareness Capability [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/19424

    Role of age and comorbidities in mortality of patients with infective endocarditis

    Get PDF
    [Purpose]: The aim of this study was to analyse the characteristics of patients with IE in three groups of age and to assess the ability of age and the Charlson Comorbidity Index (CCI) to predict mortality. [Methods]: Prospective cohort study of all patients with IE included in the GAMES Spanish database between 2008 and 2015.Patients were stratified into three age groups:<65 years,65 to 80 years,and ≥ 80 years.The area under the receiver-operating characteristic (AUROC) curve was calculated to quantify the diagnostic accuracy of the CCI to predict mortality risk. [Results]: A total of 3120 patients with IE (1327 < 65 years;1291 65-80 years;502 ≥ 80 years) were enrolled.Fever and heart failure were the most common presentations of IE, with no differences among age groups.Patients ≥80 years who underwent surgery were significantly lower compared with other age groups (14.3%,65 years; 20.5%,65-79 years; 31.3%,≥80 years). In-hospital mortality was lower in the <65-year group (20.3%,<65 years;30.1%,65-79 years;34.7%,≥80 years;p < 0.001) as well as 1-year mortality (3.2%, <65 years; 5.5%, 65-80 years;7.6%,≥80 years; p = 0.003).Independent predictors of mortality were age ≥ 80 years (hazard ratio [HR]:2.78;95% confidence interval [CI]:2.32–3.34), CCI ≥ 3 (HR:1.62; 95% CI:1.39–1.88),and non-performed surgery (HR:1.64;95% CI:11.16–1.58).When the three age groups were compared,the AUROC curve for CCI was significantly larger for patients aged <65 years(p < 0.001) for both in-hospital and 1-year mortality. [Conclusion]: There were no differences in the clinical presentation of IE between the groups. Age ≥ 80 years, high comorbidity (measured by CCI),and non-performance of surgery were independent predictors of mortality in patients with IE.CCI could help to identify those patients with IE and surgical indication who present a lower risk of in-hospital and 1-year mortality after surgery, especially in the <65-year group

    Tackling Verification and Validation Techniques to Evaluate Cyber Situational Awareness Capabilities

    Get PDF
    Since cyberspace was identified as a domain of operations, defence practitioners started a race with academy, researchers, and industry and military organizations working together towards defining related lines of capability development (e.g., DOTMLPFI) and exploring the needs and opportunities they entail. An essential cornerstone of adapting to the convergence of the cyber domain with conventional theaters of operation is the need for producing tools for easing to acquire cyber situational awareness (CSA), from which human operators shall be able to perceive, reason and project situations and events observed in cyberspace that may vertically/horizontally propagate from technological to tactical, operational and strategic planes. Benefiting from the higher maturity level of civilian capabilities for cybersecurity, the military sector has embraced the challenge of creating related beyond state-of-the-art CSA enablers that comprise the existing technological background while adopting concepts such as operations, missions or courses of action (CoAs), properly aligning them with military doctrine. Beyond ongoing development efforts, there is a wide methodological gap in the lack of suitable CSA verification and validation (V&V) frameworks, which are expected to analyze if related capabilities meet the requirements to operate in the military context; at the same time supporting the thorough development life-cycle of brand new cyber defence technologies. With the motivation of closing the identified gap, this research introduces a novel V&V framework able to guide the evaluation of CSA-related tools, which makes converge purely military aspects with dual-use state-of-the-art V&V approaches. Three core CSA evaluation concepts are discussed in-depth: software, operational and application tests. They range from the daily application of new capabilities to their ability to enable the acquisition of a joint operational picture understandable by human decision makers

    Evaluation methodology for mission-centric cyber situational awareness capabilities

    No full text
    The emerging need for cyber defence capabilities able to bring closer cyberspace supremacy in joint military operations has led defence practitioners to begin a cyber race where academy, researchers, industry and military organizations work together. Because of the higher maturity of civilian technologies for cybersecurity, this often involves adapting capabilities not initially intended for military use to new dual-use requirements, where concepts like operations, missions or Courses of Action (CoAs) shall be presented and aligned with the military doctrine. One of the main 'battle horses' in this transformation is to develop supporting systems able to facilitate the mission-centric acquisition of Cyber Situational Awareness (CSA), where the observations in the cyberspace shall be properly correlated, propagated and understood in the scope of planned/ongoing mission. But despite these CSA needs, there is a wide methodological gap in the lack of suitable validation and verification frameworks, which not only relies on the raising need for capabilities able to verify if the existing solutions meet the requirements to operate on military actions, but also to support the thorough development life-cycle of brand new cyber defence technologies. In these grounds, this research introduces a novel evaluation framework able to guide the evaluation of CSA related tools, for which three core validation concepts are discussed: Software, operational and application tests. They cover from the day-to-day implementation of the new capabilities, to their ability of facilitating that human decision-makers acquire a joint operational picture

    Acoustic cloack for airborne sound by inverse design

    Full text link
    [EN] This Letter presents practical realization of a two-dimensional low loss acoustic cloak for airborne sound obtained by inverse design. The cloak consists of 120 aluminum cylinders of 15 mm diameter surrounding the cloaked object¿a cylinder of diameter 22.5 cm. The position of each cylinder in the cloak is optimized using the data from two different techniques: genetic algorithm and simulated annealing. The operation frequency of this cloak is 3061 Hz with the bandwidth of about 100 Hz. Being a multi-step approach to the desired cloaking, the inverse design is also valid, in principle, for non-symmetric cylinders and even for three-dimensional objects. VC 2011 American Institute of PhysicsWork supported by ONR under Award N000140910554 and the Spanish MCINN under Contract Nos. TEC2010-19751, TEC2008-06756-C03-03, and CSD2008-00066 (CONSOLIDER Program). L. S. thanks the fellowship provided by CSIC with number JAEDoc-08-00351.García Chocano, VM.; Sanchis, L.; Díaz Rubio, A.; Martínez Pastor, JP.; Cervera Moreno, FS.; Llopis Pontiveros, R.; Sánchez-Dehesa Moreno-Cid, J. (2011). Acoustic cloack for airborne sound by inverse design. Applied Physics Letters. 99(7):74102-74102. https://doi.org/10.1063/1.3623761S741027410299

    Three-dimensional axisymmetric cloak based on the cancellation of acoustic scattering from a sphere

    Full text link
    This Letter presents the design, fabrication, and experimental characterization of a directional threedimensional acoustic cloak for airborne sound. The cloak consists of 60 concentric acoustically rigid tori surrounding the cloaked object, a sphere of radius 4 cm. The major radii and positions of the tori along the symmetry axis are determined using the condition of complete cancellation of the acoustic field scattered from the sphere. They are obtained through an optimization technique that combines genetic algorithm and simulated annealing. The scattering cross section of the sphere with the cloak, which is the magnitude that is minimized, is calculated using the method of fundamental solutions. The low-loss fabricated cloak shows a reduction of the 90% of the sphere scattering cross section at the frequency of 8.55 kHz.This work is partially supported by the Spanish Ministerio de Economia y Competitividad under Contracts No. TEC2010-19751, No. TEC2011-29120-C05-01, and No. CSD2008-00066 (CONSOLIDER Program), and by the U.S. Office of Naval Research. The authors acknowledge the "Centro de Tecnologias Fisicas'' at the UPV for technical help during data acquisition. We also acknowledge the computing facilities provided by the Universidad de Valencia.Sanchis Martínez, L.; García Chocano, VM.; Llopis Pontiveros, R.; Climente Alarcón, A.; Martínez Pastor, J.; Cervera Moreno, FS.; Sánchez-Dehesa Moreno-Cid, J. (2013). Three-dimensional axisymmetric cloak based on the cancellation of acoustic scattering from a sphere. Physical Review Letters. 110(12). https://doi.org/10.1103/PhysRevLett.110.124301S11012Milton, G. W., Briane, M., & Willis, J. R. (2006). On cloaking for elasticity and physical equations with a transformation invariant form. New Journal of Physics, 8(10), 248-248. doi:10.1088/1367-2630/8/10/248Cummer, S. A., & Schurig, D. (2007). One path to acoustic cloaking. New Journal of Physics, 9(3), 45-45. doi:10.1088/1367-2630/9/3/045Norris, A. N. (2009). Acoustic metafluids. The Journal of the Acoustical Society of America, 125(2), 839-849. doi:10.1121/1.3050288Chen, H., & Chan, C. T. (2007). Acoustic cloaking in three dimensions using acoustic metamaterials. Applied Physics Letters, 91(18), 183518. doi:10.1063/1.2803315Cummer, S. A., Popa, B.-I., Schurig, D., Smith, D. R., Pendry, J., Rahm, M., & Starr, A. (2008). Scattering Theory Derivation of a 3D Acoustic Cloaking Shell. Physical Review Letters, 100(2). doi:10.1103/physrevlett.100.024301Guild, M. D., Alù, A., & Haberman, M. R. (2011). Cancellation of acoustic scattering from an elastic sphere. The Journal of the Acoustical Society of America, 129(3), 1355-1365. doi:10.1121/1.3552876Martin, T. P., & Orris, G. J. (2012). Hybrid inertial method for broadband scattering reduction. Applied Physics Letters, 100(3), 033506. doi:10.1063/1.3678633Torrent, D., & Sánchez-Dehesa, J. (2008). Acoustic cloaking in two dimensions: a feasible approach. New Journal of Physics, 10(6), 063015. doi:10.1088/1367-2630/10/6/063015Cheng, Y., Yang, F., Xu, J. Y., & Liu, X. J. (2008). A multilayer structured acoustic cloak with homogeneous isotropic materials. Applied Physics Letters, 92(15), 151913. doi:10.1063/1.2903500Zhang, S., Xia, C., & Fang, N. (2011). Broadband Acoustic Cloak for Ultrasound Waves. Physical Review Letters, 106(2). doi:10.1103/physrevlett.106.024301Popa, B.-I., Zigoneanu, L., & Cummer, S. A. (2011). Experimental Acoustic Ground Cloak in Air. Physical Review Letters, 106(25). doi:10.1103/physrevlett.106.253901Farhat, M., Guenneau, S., & Enoch, S. (2009). Ultrabroadband Elastic Cloaking in Thin Plates. Physical Review Letters, 103(2). doi:10.1103/physrevlett.103.024301Stenger, N., Wilhelm, M., & Wegener, M. (2012). Experiments on Elastic Cloaking in Thin Plates. Physical Review Letters, 108(1). doi:10.1103/physrevlett.108.014301Sanchis, L., Håkansson, A., López-Zanón, D., Bravo-Abad, J., & Sánchez-Dehesa, J. (2004). Integrated optical devices design by genetic algorithm. Applied Physics Letters, 84(22), 4460-4462. doi:10.1063/1.1738931Preble, S., Lipson, M., & Lipson, H. (2005). Two-dimensional photonic crystals designed by evolutionary algorithms. Applied Physics Letters, 86(6), 061111. doi:10.1063/1.1862783Håkansson, A., Miyazaki, H. T., & Sánchez-Dehesa, J. (2006). Inverse Design for Full Control of Spontaneous Emission Using Light Emitting Scattering Optical Elements. Physical Review Letters, 96(15). doi:10.1103/physrevlett.96.153902Sanchis, L., Cryan, M. J., Pozo, J., Craddock, I. J., & Rarity, J. G. (2007). Ultrahigh Purcell factor in photonic crystal slab microcavities. Physical Review B, 76(4). doi:10.1103/physrevb.76.045118Andkjær, J., & Sigmund, O. (2011). Topology optimized low-contrast all-dielectric optical cloak. Applied Physics Letters, 98(2), 021112. doi:10.1063/1.3540687Håkansson, A., Cervera, F., & Sánchez-Dehesa, J. (2005). Sound focusing by flat acoustic lenses without negative refraction. Applied Physics Letters, 86(5), 054102. doi:10.1063/1.1852719García-Chocano, V. M., Sanchis, L., Díaz-Rubio, A., Martínez-Pastor, J., Cervera, F., Llopis-Pontiveros, R., & Sánchez-Dehesa, J. (2011). Acoustic cloak for airborne sound by inverse design. Applied Physics Letters, 99(7), 074102. doi:10.1063/1.3623761Håkansson, A. (2007). Cloaking of objects from electromagnetic fields by inverse design of scattering optical elements. Optics Express, 15(7), 4328. doi:10.1364/oe.15.004328Kirkpatrick, S., Gelatt, C. D., & Vecchi, M. P. (1983). Optimization by Simulated Annealing. Science, 220(4598), 671-680. doi:10.1126/science.220.4598.671Seybert, A. F., Soenarko, B., Rizzo, F. J., & Shippy, D. J. (1986). A special integral equation formulation for acoustic radiation and scattering for axisymmetric bodies and boundary conditions. The Journal of the Acoustical Society of America, 80(4), 1241-1247. doi:10.1121/1.393817Karageorghis, A., & Fairweather, G. (1998). The method of fundamental solutions for axisymmetric acoustic scattering and radiation problems. The Journal of the Acoustical Society of America, 104(6), 3212-3218. doi:10.1121/1.423961Milton, G. W., & Nicorovici, N.-A. P. (2006). On the cloaking effects associated with anomalous localized resonance. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 462(2074), 3027-3059. doi:10.1098/rspa.2006.171

    Compuestos macrocíclicos de tipo escorpiando y su uso como antiparasitarios

    No full text
    Número de publicación: 2414291. Número de solicitud: 201132035.La presente invención hace referencia a compuestos macrocíclicos de tipo escorpiando, los cuales adquieren dicha nomenclatura debido a la particular forma de su estructura química formada por un cuerpo macrocíclico y un brazo colgante donde pueden sustituirse diferentes radicales. La presente invención además comprende el uso de dichos compuestos como medicamentos, particularmente en el tratamiento de enfermedades causadas por parásitos, preferentemente por los parásitos Trypanosoma cruzi o Leishmania spp, como por ejemplo la enfermedad de Chagas o la Leishmaniasis.Universidad de Granad

    Guía de uso de los materiales de matemáticas : primer ciclo : Profesor

    No full text
    El material completo consta de una guía de uso para el profesorado y de 8 carpetas de actividades escolares de aulaEstos materiales constituyen una propuesta de gran utilidad a la hora de organizar y distribuir los contenidos del área de matemáticas para el primer ciclo de la educación secundaria obligatoria. Forman una propuesta concreta de desarrollo de todo un ciclo y, además contienen una amplísima gama de actividades que se pueden incorporar a distintos tipos de programaciones que cada profesor elabore.ValenciaBiblioteca de Educación del Ministerio de Educación, Cultura y Deporte; Calle San Agustín 5 -3 Planta; 28014 Madrid; Tel. +34917748000; [email protected]
    corecore