950 research outputs found

    Uncovering Vulnerable Industrial Control Systems from the Internet Core

    Full text link
    Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., DRDoS~attacks). In this paper, we uncover unprotected inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. This traffic analysis is correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS communication. Our results can be used i) to create precise filters for potentially harmful non-industrial ICS traffic, and ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks

    Biomedical signal identification and analysis

    Get PDF
    In the article there have been presented methods of measuring and analysis biological signals, which may be used as signals control mechanical system. Among others, ther have been decribed the usage of EEG (electroencephalographic signal). Like in the case of other signals, the analysis of bio-medical signals most often resolves itself to the frequency analysis of their content with the help of Fourier transformation, and their processing the most often has a form of frequency filtering; in other words, removing from a signal its components with defined frequencies, for example, interferences. The researches have two parts. In the first part date was generated in Lab View program, and next the analysis was done (it was an example of EEG signal). In the next part the EEG signal was measured using 32 channels apertures and next real signal was analyzed using Lab View

    Industrial control protocols in the Internet core: Dismantling operational practices

    Get PDF
    Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., by DRDoS attacks). In this paper, we measure and analyze inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. These traffic observations are correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We uncover mainly unprotected inter-domain ICS traffic and provide an in-depth view on Internet-wide ICS communication. Our results can be used (i) to create precise filters for potentially harmful non-industrial ICS traffic and (ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks. Additionally, we survey recent security extensions of ICS protocols, of which we find very little deployment. We estimate an upper bound of the deployment status for ICS security protocols in the Internet core

    Survival analysis of patients with locally advanced non-small cell lung cancer treated at the Nu-Med Radiotherapy Center in Elbląg

    Get PDF
    Introduction.  The study aimed to report the efficiency of radical radiotherapy and chemoradiotherapy in patients with non-small cell lung cancer (NSCLC) treated in the Nu-Med Radiotherapy Center in Elbląg. Material and methods.  Ninety-two patients diagnosed with NSCLC treated between 2013 and 2016 were included in the analysis. Overall survival (OS) was estimated by the Kaplan-Meier method. Results.  The 2-year OS for all patients was 36% (median 1.5 years). Two prognostic factors had a significant impact: tre­atment method and performance status (PS). Patients who underwent concurrent radiochemotherapy and were treated sequentially had a better 2-year OS in comparison with those treated with radiotherapy alone (respectively 46% and 37% vs. 25%, p ≤ 0.05). Patients with PS 0–1 had better OS (median 1.6 years) compared with PS 2 (median 0.7 years, p = 0.04). Other prognostic factors analysed had no impact on OS in our study. Conclusions.  The treatment results of our patients are comparable to those in published trials and meta-analyses

    Detecting Gaze Direction Using Robot-Mounted and Mobile-Device Cameras

    Get PDF
    Two common channels through which humans communicate are speech andgaze. Eye gaze is an important mode of communication: it allows people tobetter understand each others’ intentions, desires, interests, and so on. The goalof this research is to develop a framework for gaze triggered events which canbe executed on a robot and mobile devices and allows to perform experiments.We experimentally evaluate the framework and techniques for extracting gazedirection based on a robot-mounted camera or a mobile-device camera whichare implemented in the framework. We investigate the impact of light on theaccuracy of gaze estimation, and also how the overall accuracy depends on usereye and head movements. Our research shows that the light intensity is im-portant, and the placement of light source is crucial. All the robot-mountedgaze detection modules we tested were found to be similar with regard to ac-curacy. The framework we developed was tested in a human-robot interactionexperiment involving a job-interview scenario. The flexible structure of thisscenario allowed us to test different components of the framework in variedreal-world scenarios, which was very useful for progressing towards our long-term research goal of designing intuitive gaze-based interfaces for human robotcommunication

    SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots

    Full text link
    In this paper, we revisit the use of honeypots for detecting reflective amplification attacks. These measurement tools require careful design of both data collection and data analysis including cautious threshold inference. We survey common amplification honeypot platforms as well as the underlying methods to infer attack detection thresholds and to extract knowledge from the data. By systematically exploring the threshold space, we find most honeypot platforms produce comparable results despite their different configurations. Moreover, by applying data from a large-scale honeypot deployment, network telescopes, and a real-world baseline obtained from a leading DDoS mitigation provider, we question the fundamental assumption of honeypot research that convergence of observations can imply their completeness. Conclusively we derive guidance on precise, reproducible honeypot research, and present open challenges.Comment: camera-read

    Securing name resolution in the IoT: DNS over CoAP

    Full text link
    In this paper, we present the design, implementation, and analysis of DNS over CoAP (DoC), a new proposal for secure and privacy-friendly name resolution of constrained IoT devices. We implement different design choices of DoC in RIOT, an open-source operating system for the IoT, evaluate performance measures in a testbed, compare with DNS over UDP and DNS over DTLS, and validate our protocol design based on empirical DNS IoT data. Our findings indicate that plain DoC is on par with common DNS solutions for the constrained IoT but significantly outperforms when additional, CoAP standard features are used such as block-wise transfer or caching. With OSCORE for end-to-end security, we can save more than 10 kBytes of code memory compared to DTLS while enabling group communication without compromising the trust chain when using intermediate proxies or caches. We also discuss a scheme for very restricted links that compresses redundant or excessive information by up to 70%.Comment: 12 pages, 13 figures, 4 table

    Absolute measurement of the ^{1}S_{0} − ^{3}P_{0} clock transition in neutral ^{88}Sr over the 330 km-long stabilized fibre optic link

    Get PDF
    We report a stability below 7×10177\times 10{}^{-17} of two independent optical lattice clocks operating with bosonic 88{}^{88}Sr isotope. The value (429228066418008.3(1.9)syst{}_{syst}(0.9)stat{}_{stat}~Hz) of the absolute frequency of the 1S0{}^{1}S_{0} - 3P0{}^{3}P_{0} transition was measured with an optical frequency comb referenced to the local representation of the UTC by the 330 km-long stabilized fibre optical link. The result was verified by series of measurements on two independent optical lattice clocks and agrees with recommendation of Bureau International des Poids et Mesures

    Parallax in “Pi of the Sky” project

    Get PDF
    The main goal of the “Pi of the Sky” project is search for optical transients (OTs) of astrophysical origin, in particular those related to gamma-ray bursts (GRBs). Since March 2011 the project has two running observatories: one in northern Chile and the other one insouthern Spain. This allows for regular observations of a common sky fields, visible from both observatories which are scheduled usually 1–2 h per night. In such a case, the on-line flash recognition algorithm, looking for optical transients, can use parallax information toassure that events observed from both sites have parallax angle smaller than the error of astrometry. On the other hand, the remaining OT candidates can be verified against a hypothesis of being near-Earth objects. This paper presents algorithm using parallax information for identification of near-Earth objects, which might be satellites, or space debris elements. Preliminary results of the algorithm are also presented
    corecore