2,356 research outputs found

    Leveraging Conventional Internet Routing Protocol Behavior to Defeat DDoS and Adverse Networking Conditions

    Get PDF
    The Internet is a cornerstone of modern society. Yet increasingly devastating attacks against the Internet threaten to undermine the Internet\u27s success at connecting the unconnected. Of all the adversarial campaigns waged against the Internet and the organizations that rely on it, distributed denial of service, or DDoS, tops the list of the most volatile attacks. In recent years, DDoS attacks have been responsible for large swaths of the Internet blacking out, while other attacks have completely overwhelmed key Internet services and websites. Core to the Internet\u27s functionality is the way in which traffic on the Internet gets from one destination to another. The set of rules, or protocol, that defines the way traffic travels the Internet is known as the Border Gateway Protocol, or BGP, the de facto routing protocol on the Internet. Advanced adversaries often target the most used portions of the Internet by flooding the routes benign traffic takes with malicious traffic designed to cause widespread traffic loss to targeted end users and regions. This dissertation focuses on examining the following thesis statement. Rather than seek to redefine the way the Internet works to combat advanced DDoS attacks, we can leverage conventional Internet routing behavior to mitigate modern distributed denial of service attacks. The research in this work breaks down into a single arc with three independent, but connected thrusts, which demonstrate that the aforementioned thesis is possible, practical, and useful. The first thrust demonstrates that this thesis is possible by building and evaluating Nyx, a system that can protect Internet networks from DDoS using BGP, without an Internet redesign and without cooperation from other networks. This work reveals that Nyx is effective in simulation for protecting Internet networks and end users from the impact of devastating DDoS. The second thrust examines the real-world practicality of Nyx, as well as other systems which rely on real-world BGP behavior. Through a comprehensive set of real-world Internet routing experiments, this second thrust confirms that Nyx works effectively in practice beyond simulation as well as revealing novel insights about the effectiveness of other Internet security defensive and offensive systems. We then follow these experiments by re-evaluating Nyx under the real-world routing constraints we discovered. The third thrust explores the usefulness of Nyx for mitigating DDoS against a crucial industry sector, power generation, by exposing the latent vulnerability of the U.S. power grid to DDoS and how a system such as Nyx can protect electric power utilities. This final thrust finds that the current set of exposed U.S. power facilities are widely vulnerable to DDoS that could induce blackouts, and that Nyx can be leveraged to reduce the impact of these targeted DDoS attacks

    Information-Seeking Behaviors of Business Faculty

    Get PDF
    This is an electronic version of an article published in the Journal of Business & Finance Librarianship, volume 19, issue 1. 2014. The Journal of Business & Finance Librarianship is available online at: http://www.tandfonline.com/doi/full/10.1080/08963568.2014.852906Numerous studies have been performed on information-seeking behaviors in specific disciplines but not in business. The purpose of this study was to gather a better understanding of business faculty research processes and, in doing so, come away with ideas on how best to support their initiatives. A comprehensive survey was sent to all business faculty members at the authors’ institution. The results led to discussions on topics including resource preferences, library usage, and institutional repositories

    Resolving the H-alpha-emitting Region in the Wind of Eta Carinae

    Full text link
    The massive evolved star Eta Carinae is the most luminous star in the Milky Way and has the highest steady wind mass-loss rate of any known star. Radiative transfer models of the spectrum by Hillier et al. predict that H-alpha is mostly emitted in regions of the wind at radii of 6 to 60 AU from the star (2.5 to 25 mas at 2.35 kpc). We present diffraction-limited images (FWHM ~25 mas) with Magellan adaptive optics in two epochs, showing that Eta Carinae consistently appears ~2.5 to 3 mas wider in H-alpha emission compared to the adjacent 643 nm continuum. This implies that the H-alpha line-forming region may have a characteristic emitting radius of 12 mas or ~30 AU, in very good agreement with the Hillier stellar-wind model. This provides direct confirmation that the physical wind parameters of that model are roughly correct, including the mass-loss rate of 10^-3 M_sun/yr, plus the clumping factor, and the terminal velocity. Comparison of the H-alpha images (ellipticity and PA) to the continuum images reveals no significant asymmetries at H-alpha. Hence, any asymmetry induced by a companion or by the primary's rotation do not strongly influence the global H-alpha emission in the outer wind.Comment: Published in ApJ

    Foam/aerogel composite materials for thermal and acoustic insulation and cryogen storage

    Get PDF
    The invention involves composite materials containing a polymer foam and an aerogel. The composite materials have improved thermal insulation ability, good acoustic insulation, and excellent physical mechanical properties. The composite materials can be used, for instance, for heat and acoustic insulation on aircraft, spacecraft, and maritime ships in place of currently used foam panels and other foam products. The materials of the invention can also be used in building construction with their combination of light weight, strength, elasticity, ability to be formed into desired shapes, and superior thermal and acoustic insulation power. The materials have also been found to have utility for storage of cryogens. A cryogenic liquid or gas, such as N.sub.2 or H.sub.2, adsorbs to the surfaces in aerogel particles. Thus, another embodiment of the invention provides a storage vessel for a cryogen

    Context-Sensitive Auto-Sanitization for PHP

    Get PDF

    Decoy peptide targeted to Toll-IL-1R domain inhibits LPS and TLR4-active metabolite morphine-3 glucuronide sensitization of sensory neurons

    Get PDF
    Accumulating evidence indicates that Toll-like receptor (TLR) signaling adapter protein interactions with Toll/Interleukin-1 Receptor (TIR) domains present in sensory neurons may modulate neuropathic pain states. Following ligand interaction with TLRs, TIR serves to both initiate intracellular signaling and facilitate recruitment of signaling adapter proteins to the intracytoplasmic domain. Although TLR TIR is central to a number of TLR signaling cascades, its role in sensory neurons is poorly understood. In this study we investigated the degree to which TLR TIR decoy peptide modified to include a TAT sequence (Trans-Activator of Transcription gene in HIV; TAT-4BB) affected LPS-induced intracellular calcium flux and excitation in sensory neurons, and behavioral changes due to TLR4 active metabolite, morphine-3-glucuronide (M3G) exposure in vivo. TAT-4BB inhibited LPS-induced calcium changes in a majority of sensory neurons and decreased LPS-dependent neuronal excitability in small diameter neurons. Acute systemic administration of the TAT-4BB reversed M3G-induced tactile allodynia in a dose-dependent manner but did not affect motor activity, anxiety or responses to noxious thermal stimulus. These data suggest that targeting TLR TIR domains may provide novel pharmacological targets to reduce or reverse TLR4-dependent pain behavior in the rodent
    • …
    corecore