4,977 research outputs found

    R-CAD: Rare Cyber Alert Signature Relationship Extraction Through Temporal Based Learning

    Get PDF
    The large number of streaming intrusion alerts make it challenging for security analysts to quickly identify attack patterns. This is especially difficult since critical alerts often occur too rarely for traditional pattern mining algorithms to be effective. Recognizing the attack speed as an inherent indicator of differing cyber attacks, this work aggregates alerts into attack episodes that have distinct attack speeds, and finds attack actions regularly co-occurring within the same episode. This enables a novel use of the constrained SPADE temporal pattern mining algorithm to extract consistent co-occurrences of alert signatures that are indicative of attack actions that follow each other. The proposed Rare yet Co-occurring Attack action Discovery (R-CAD) system extracts not only the co-occurring patterns but also the temporal characteristics of the co-occurrences, giving the `strong rules\u27 indicative of critical and repeated attack behaviors. Through the use of a real-world dataset, we demonstrate that R-CAD helps reduce the overwhelming volume and variety of intrusion alerts to a manageable set of co-occurring strong rules. We show specific rules that reveal how critical attack actions follow one another and in what attack speed

    A Class of Stationary Electromagnetic Vacuum Fields

    Get PDF
    This is the published version, also available here: http://dx.doi.org/10.1063/1.1666066.It is shown how a new class of stationary electromagnetic vacuum fields can be generated from solutions of Laplace's equation. These fields are a stationary generalization of the static electromagnetic vacuum fields of Weyl, Majumdar, and Papapetrou, and are plausibly interpreted as exterior fields of static or steadily moving distributions of charged dust having numerically equal charge and mass densities

    Towards an Efficient Detection of Pivoting Activity

    Get PDF
    Pivoting is a technique used by cyber attackers to exploit the privileges of compromised hosts in order to reach their final target. Existing research on countering this menace is only effective for pivoting activities spanning within the internal network perimeter. When applying existing methods to include external traffic, the detection algorithm produces overwhelming entries, most of which unrelated to pivoting. We address this problem by identifying the major characteristics that are specific to potentially malicious pivoting. Our analysis combines human expertise with machine learning and is based on the inspection of real network traffic generated by a large organization. The final goal is the reduction of the unacceptable amounts of false positives generated by the state of the art methods. This paper paves the way for future researches aimed at countering the critical menace of illegitimate pivoting activities

    Phase transitions and the internal noise structure of nonlinear Schr\"odi nger equation solitons

    Full text link
    We predict phase-transitions in the quantum noise characteristics of systems described by the quantum nonlinear Schr\"odinger equation, showing them to be related to the solitonic field transition at half the fundamental soliton amplitude. These phase-transitions are robust with respect to Raman noise and scattering losses. We also describe the rich internal quantum noise structure of the solitonic fields in the vicinity of the phase-transition. For optical coherent quantum solitons, this leads to the prediction that eliminating the peak side-band noise due to the electronic nonlinearity of silica fiber by spectral filtering leads to the optimal photon-number noise reduction of a fundamental soliton.Comment: 10 pages, 5 figure

    Quantifying impact on safety from cyber-attacks on cyber-physical systems

    Full text link
    We propose a novel framework for modelling attack scenarios in cyber-physical control systems: we represent a cyber-physical system as a constrained switching system, where a single model embeds the dynamics of the physical process, the attack patterns, and the attack detection schemes. We show that this is compatible with established results in the analysis of hybrid automata, and, specifically, constrained switching systems. Moreover, we use the developed models to compute the impact of cyber attacks on the safety properties of the system. In particular, we characterise system safety as an asymptotic property, by calculating the maximal safe set. The resulting new impact metrics intuitively quantify the degradation of safety under attack. We showcase our results via illustrative examples.Comment: 8 pages, 5 figures, submitted for presentation to IFAC World Congress 2023, Yokohama, JAPA

    Nonlinear Transport through Quantum Dots Studied by the Time-Dependent DMRG

    Full text link
    Recent developments on studies of transport through quantum dots obtained by applying the time-dependent density matrix renormalization group method are summarized. Some new aspects of Kondo physics which appear in nonequilibrium steady states are discussed both for the single dot case and for the serially coupled double-quantum-dot case.Comment: 8 pages, 15 figure

    Isolated-photon production in polarized pp collisions

    Get PDF
    We perform a detailed study of the production of isolated prompt photons in polarized hadronic collisions, in the centre-of-mass energy range relevant to RHIC. We compare the results obtained for a traditional cone-isolation prescription, with those obtained by imposing an isolation condition that eliminates any contribution to the cross section from the fragmentation mechanism. The latter prescription will allow us to present the first fully consistent next-to-leading order calculation in polarized prompt-photon production. We will discuss the theoretical uncertainties affecting the cross section, addressing the issue of the reliability of the perturbative expansion, for both inclusive isolated-photon and photon-plus-jet observables. Finally, we will study the dependence of our predictions upon the polarized parton densities, and the implications for the measurability of the gluon density.Comment: 34 Pages, LaTeX, 13 figures as ps file

    A Spitzer-IRS Detection of Crystalline Silicates in a Protostellar Envelope

    Get PDF
    We present the Spitzer Space Telescope Infrared Spectrograph spectrum of the Orion A protostar HOPS-68. The mid-infrared spectrum reveals crystalline substructure at 11.1, 16.1, 18.8, 23.6, 27.9, and 33.6 microns superimposed on the broad 9.7 and 18 micron amorphous silicate features; the substructure is well matched by the presence of the olivine end-member forsterite. Crystalline silicates are often observed as infrared emission features around the circumstellar disks of Herbig Ae/Be stars and T Tauri stars. However, this is the first unambiguous detection of crystalline silicate absorption in a cold, infalling, protostellar envelope. We estimate the crystalline mass fraction along the line-of-sight by first assuming that the crystalline silicates are located in a cold absorbing screen and secondly by utilizing radiative transfer models. The resulting crystalline mass fractions of 0.14 and 0.17, respectively, are significantly greater than the upper limit found in the interstellar medium (< 0.02-0.05). We propose that the amorphous silicates were annealed within the hot inner disk and/or envelope regions and subsequently transported outward into the envelope by entrainment in a protostellar outflowComment: Accepted to Astrophysical Journal Letters, 2011 April 19: 6 pages, 3 figures, 2 table

    OODCN: Out-of-distribution detection in capsule networks for fault identification

    Get PDF
    • …
    corecore