950 research outputs found
Uncovering Vulnerable Industrial Control Systems from the Internet Core
Industrial control systems (ICS) are managed remotely with the help of
dedicated protocols that were originally designed to work in walled gardens.
Many of these protocols have been adapted to Internet transport and support
wide-area communication. ICS now exchange insecure traffic on an inter-domain
level, putting at risk not only common critical infrastructure but also the
Internet ecosystem (e.g., DRDoS~attacks).
In this paper, we uncover unprotected inter-domain ICS traffic at two central
Internet vantage points, an IXP and an ISP. This traffic analysis is correlated
with data from honeypots and Internet-wide scans to separate industrial from
non-industrial ICS traffic. We provide an in-depth view on Internet-wide ICS
communication. Our results can be used i) to create precise filters for
potentially harmful non-industrial ICS traffic, and ii) to detect ICS sending
unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and
traffic manipulation attacks
Biomedical signal identification and analysis
In the article there have been presented methods of measuring and analysis biological signals, which may be used as signals control mechanical system. Among others, ther have been decribed the usage of EEG (electroencephalographic signal). Like in the case of other signals, the analysis of bio-medical signals most often resolves itself to the frequency analysis of their content with the help of Fourier transformation, and their processing the most often has a form of frequency filtering; in other words, removing from a signal its components with defined frequencies, for example, interferences. The researches have two parts. In the first part date was generated in Lab View program, and next the analysis was done (it was an example of EEG signal). In the next part the EEG signal was measured using 32 channels apertures and next real signal was analyzed using Lab View
Industrial control protocols in the Internet core: Dismantling operational practices
Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the Internet ecosystem (e.g., by DRDoS attacks). In this paper, we measure and analyze inter-domain ICS traffic at two central Internet vantage points, an IXP and an ISP. These traffic observations are correlated with data from honeypots and Internet-wide scans to separate industrial from non-industrial ICS traffic. We uncover mainly unprotected inter-domain ICS traffic and provide an in-depth view on Internet-wide ICS communication. Our results can be used (i) to create precise filters for potentially harmful non-industrial ICS traffic and (ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks. Additionally, we survey recent security extensions of ICS protocols, of which we find very little deployment. We estimate an upper bound of the deployment status for ICS security protocols in the Internet core
Survival analysis of patients with locally advanced non-small cell lung cancer treated at the Nu-Med Radiotherapy Center in Elbląg
Introduction. The study aimed to report the efficiency of radical radiotherapy and chemoradiotherapy in patients with non-small cell lung cancer (NSCLC) treated in the Nu-Med Radiotherapy Center in Elbląg.
Material and methods. Ninety-two patients diagnosed with NSCLC treated between 2013 and 2016 were included in the analysis. Overall survival (OS) was estimated by the Kaplan-Meier method.
Results. The 2-year OS for all patients was 36% (median 1.5 years). Two prognostic factors had a significant impact: treatment method and performance status (PS). Patients who underwent concurrent radiochemotherapy and were treated sequentially had a better 2-year OS in comparison with those treated with radiotherapy alone (respectively 46% and 37% vs. 25%, p ≤ 0.05). Patients with PS 0–1 had better OS (median 1.6 years) compared with PS 2 (median 0.7 years, p = 0.04). Other prognostic factors analysed had no impact on OS in our study.
Conclusions. The treatment results of our patients are comparable to those in published trials and meta-analyses
Detecting Gaze Direction Using Robot-Mounted and Mobile-Device Cameras
Two common channels through which humans communicate are speech andgaze. Eye gaze is an important mode of communication: it allows people tobetter understand each others’ intentions, desires, interests, and so on. The goalof this research is to develop a framework for gaze triggered events which canbe executed on a robot and mobile devices and allows to perform experiments.We experimentally evaluate the framework and techniques for extracting gazedirection based on a robot-mounted camera or a mobile-device camera whichare implemented in the framework. We investigate the impact of light on theaccuracy of gaze estimation, and also how the overall accuracy depends on usereye and head movements. Our research shows that the light intensity is im-portant, and the placement of light source is crucial. All the robot-mountedgaze detection modules we tested were found to be similar with regard to ac-curacy. The framework we developed was tested in a human-robot interactionexperiment involving a job-interview scenario. The flexible structure of thisscenario allowed us to test different components of the framework in variedreal-world scenarios, which was very useful for progressing towards our long-term research goal of designing intuitive gaze-based interfaces for human robotcommunication
SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots
In this paper, we revisit the use of honeypots for detecting reflective
amplification attacks. These measurement tools require careful design of both
data collection and data analysis including cautious threshold inference. We
survey common amplification honeypot platforms as well as the underlying
methods to infer attack detection thresholds and to extract knowledge from the
data. By systematically exploring the threshold space, we find most honeypot
platforms produce comparable results despite their different configurations.
Moreover, by applying data from a large-scale honeypot deployment, network
telescopes, and a real-world baseline obtained from a leading DDoS mitigation
provider, we question the fundamental assumption of honeypot research that
convergence of observations can imply their completeness. Conclusively we
derive guidance on precise, reproducible honeypot research, and present open
challenges.Comment: camera-read
Securing name resolution in the IoT: DNS over CoAP
In this paper, we present the design, implementation, and analysis of DNS
over CoAP (DoC), a new proposal for secure and privacy-friendly name resolution
of constrained IoT devices. We implement different design choices of DoC in
RIOT, an open-source operating system for the IoT, evaluate performance
measures in a testbed, compare with DNS over UDP and DNS over DTLS, and
validate our protocol design based on empirical DNS IoT data. Our findings
indicate that plain DoC is on par with common DNS solutions for the constrained
IoT but significantly outperforms when additional, CoAP standard features are
used such as block-wise transfer or caching. With OSCORE for end-to-end
security, we can save more than 10 kBytes of code memory compared to DTLS while
enabling group communication without compromising the trust chain when using
intermediate proxies or caches. We also discuss a scheme for very restricted
links that compresses redundant or excessive information by up to 70%.Comment: 12 pages, 13 figures, 4 table
Absolute measurement of the ^{1}S_{0} − ^{3}P_{0} clock transition in neutral ^{88}Sr over the 330 km-long stabilized fibre optic link
We report a stability below of two independent optical
lattice clocks operating with bosonic Sr isotope. The value
(429228066418008.3(1.9)(0.9)~Hz) of the absolute
frequency of the - transition was measured with an
optical frequency comb referenced to the local representation of the UTC by the
330 km-long stabilized fibre optical link. The result was verified by series of
measurements on two independent optical lattice clocks and agrees with
recommendation of Bureau International des Poids et Mesures
Parallax in “Pi of the Sky” project
The main goal of the “Pi of the Sky” project is search for optical transients (OTs) of astrophysical origin, in particular those related to gamma-ray bursts (GRBs). Since March 2011 the project has two running observatories: one in northern Chile and the other one insouthern Spain. This allows for regular observations of a common sky fields, visible from both observatories which are scheduled usually 1–2 h per night. In such a case, the on-line flash recognition algorithm, looking for optical transients, can use parallax information toassure that events observed from both sites have parallax angle smaller than the error of astrometry. On the other hand, the remaining OT candidates can be verified against a hypothesis of being near-Earth objects. This paper presents algorithm using parallax information for identification of near-Earth objects, which might be satellites, or space debris elements. Preliminary results of the algorithm are also presented
- …