26 research outputs found

    DNA-based client puzzle for WLAN association protocol against connection request flooding

    Get PDF
    In recent past, Wireless Local Area Network (WLAN) has become more popular because of its flexibility. However, WLANs are subjected to different types of vulnerabilities. To strengthen WLAN security, many high security protocols have been developed. But those solutions are found to be ineffective in preventing Denial of Service (DoS) attacks. A ‘Connection Request Flooding’ DoS (CRF-DoS) attack is launched when an access point (AP) encounters a sudden explosion of connection requests. Among other existing anti CRF-DoS methods, a client puzzle protocol has been noted as a promising and secure potential solution. Nonetheless, so far none of the proposed puzzles satisfy the security requirement of resource-limited and highly heterogeneous WLANs. The CPU disparity, imposing unbearable loads on legitimate users, inefficient puzzle generation and verification algorithms; the susceptibility of puzzle to secondary attacks on legitimate users by embedding fake puzzle parameters; and a notable delay in modifying the puzzle difficulty – these are some drawbacks of currently existing puzzles. To deal with such problems, a secure model of puzzle based on DNA and queuing theory is proposed, which eliminates the above defects while satisfying the Chen puzzle security model. The proposed puzzle (OROD puzzle) is a multifaceted technology that incorporates five main components include DoS detector, queue manager, puzzle generation, puzzle verification, and puzzle solver. To test and evaluate the security and performance, OROD puzzle is developed and implemented in real-world environment. The experimental results showed that the solution verification time of OROD puzzle is up to 289, 160, 9, 3.2, and 2.3 times faster than the Karame-Capkun puzzle, the Rivest time-lock puzzle, the Rangasamy puzzle, the Kuppusamy DLPuz puzzle, and Chen's efficient hash-based puzzle respectively. The results also showed a substantial reduction in puzzle generation time, making the OROD puzzle from 3.7 to 24 times faster than the above puzzles. Moreover, by asking to solve an easy and cost-effective puzzle in OROD puzzle, legitimate users do not suffer from resource exhaustion during puzzle solving, even when under severe DoS attack (high puzzle difficulty)

    A Novel WLAN Client Puzzle against DoS Attack Based on Pattern Matching

    Get PDF
    Despite the popularity of 802.11 based networks, they suffer several types of DoS attack, launched by an attacker whose aim is to make an access point (AP) unavailable to legitimate users. One of the most common DoS attacks on 802.11 based networks is to deplete the resources of the AP. A serious situation like this can occur when the AP receives a burst of connection requests. This paper addresses this common DoS attack and proposes a lightweight puzzle, based on pattern-matching. Using a pattern-matching technique, this model adequately resists resource-depletion attacks in terms of both puzzle generation and solution verification. Using a sensible series of contextual comparisons, the outcomes were modelled by a simulator, and the security definition and proofs are verified, among other results

    Economic Growth and Internet Usage Impact on Publication Productivity among ASEAN’s and World’s Best Universities

    Get PDF
    Measuring the number of papers which are published each year, publication productivity is the factor which shows the reputation of universities and countries. However, the effect of growing economy and using internet on the publication productivity in Asian countries has not been discovered yet. The present research is going to figure out the publication productivity among the elite universities in Asian countries and also ten top universities around the world in the last twenty years (from 1993 to 2012). Furthermore, the current research is aimed to study the relationship among publication, gross domestic product (GDP) and internet usage. It is worth to mention that the publication of the top Ten Malaysian Universities was regarded for the similar period of time. To get the exact numbers of documents like papers, conference articles, review papers and letters which are published by the universities in the last twenty years, the writer of the same paper used the Science Direct database. Moreover, the data for GDP and the number of internet usage was collected through the World Bank database (World Data Bank).To compare all kinds of publications,one-way ANOVA was used and to investigate the impact of economic growth and internet usage on publication productivity, multiple regression analysis was applied.The results showed that the rate of publication growth was 1.9, 20.9, and 65.5 in top universities in the world, ASEAN countries and Malaysia, respectively.The results also showed that there was a positive and significant correlation between GDP and the number of internet users with the number of publications in ASEAN and Malaysian universities. Internet usage had much more influence in comparison with the GDP in predicting the number of publications among these groups except for top ten Malaysian universities from 2003 to 2012. In summary, publication trends in top ten Malaysian and ASEAN universities are promising. However, policy makers and science managers should spend much more percentage of their GDP on Internet facilities and research studies that their outputs lead to more rapid economic growth and internet usage

    Endometrial carcinoma, grossing and processing issues: recommendations of the International Society of Gynecologic Pathologists.

    Get PDF
    Endometrial cancer is the most common gynecologic neoplasm in developed countries; however, updated universal guidelines are currently not available to handle specimens obtained during the surgical treatment of patients affected by this disease. This article presents recommendations on how to gross and submit sections for microscopic examination of hysterectomy specimens and other tissues removed during the surgical management of endometrial cancer such as salpingo-oophorectomy, omentectomy, and lymph node dissection-including sentinel lymph nodes. In addition, the intraoperative assessment of some of these specimens is addressed. These recommendations are based on a review of the literature, grossing manuals from various institutions, and a collaborative effort by a subgroup of the Endometrial Cancer Task Force of the International Society of Gynecological Pathologists. The aim of these recommendations is to standardize the processing of endometrial cancer specimens which is vital for adequate pathological reporting and will ultimately improve our understanding of this disease

    Pathologic Prognostic Factors in Endometrial Carcinoma (Other Than Tumor Type and Grade)

    Get PDF
    Although endometrial carcinoma (EC) is generally considered to have a good prognosis, over 20% of women with EC die of their disease, with a projected increase in both incidence and mortality over the next few decades. The aim of accurate prognostication is to ensure that patients receive optimal treatment and are neither overtreated nor undertreated, thereby improving patient outcomes overall. Patients with EC can be categorized into prognostic risk groups based on clinicopathologic findings. Other than tumor type and grade, groupings and recommended management algorithms may take into account age, body mass index, stage, and presence of lymphovascular space invasion. The molecular classification of EC that has emerged from the Cancer Genome Atlas (TCGA) study provides additional, potentially superior, prognostic information to traditional histologic typing and grading. This classifier does not, however, replace clinicopathologic risk assessment based on parameters other than histotype and grade. It is envisaged that molecular and clinicopathologic prognostic grouping systems will work better together than either alone. Thus, while tumor typing and grading may be superseded by a classification based on underlying genomic abnormalities, accurate assessment of other pathologic parameters will continue to be key to patient management. These include those factors related to staging, such as depth of myometrial invasion, cervical, vaginal, serosal surface, adnexal and parametrial invasion, and those independent of stage such as lymphovascular space invasion. Other prognostic parameters will also be discussed. These recommendations were developed from the International Society of Gynecological Pathologists Endometrial Carcinoma project

    Effective Strategies for Increasing Citation Frequency

    Get PDF
    Due to the effect of citation impact on The Higher Education (THE) world university ranking system, most of the researchers are looking for some helpful techniques to increase their citation record. This paper by reviewing the relevant articles extracts 33 different ways for increasing the citations possibilities. The results show that the article visibility has tended to receive more download and citations. This is probably the first study to collect over 30 different ways to improve the citation record. Further study is needed to explore and expand these techniques in specific fields of study in order to make the results more precisely

    A novel WLAN client puzzle against DoS attack based on pattern matching

    No full text
    Despite the popularity of 802.11 based networks, they suffer several types of DoS attack, launched by an attacker whose aim is to make an access point (AP) unavailable to legitimate users. One of the most common DoS attacks on 802.11 based networks is to deplete the resources of the AP. A serious situation like this can occur when the AP receives a burst of connection requests. This paper addresses this common DoS attack and proposes a lightweight puzzle, based on pattern-matching. Using a pattern-matching technique, this model adequately resists resource-depletion attacks in terms of both puzzle generation and solution verification. Using a sensible series of contextual comparisons, the outcomes were modelled by a simulator, and the security definition and proofs are verified, among other results
    corecore