22 research outputs found

    Blockchain-based Architecture for Interdomain Cybersecurity Research

    Get PDF
    We designed and developed a novel application that applies blockchain technology in cybersecurity. This architecture allows different companies to come together to promptly exchange cyberattack information in a secure way to detect coordinated or distributed attacks. In addition to this, the architecture allows the public node to connect to the blockchain network and retrieve the stored attack information in real-time. The processes involved in exchanging the attack information are: (i) extraction of the attack information, (ii) preparing and submitting it as transactions to a blockchain network, (iii) verification of the submitted information, (iv) validation and chaining the transaction to blockchain and (v) distribution to other blockchain nodes. The novelty in the proposed work is that the architecture facilitates scalable and secured attack features exchange and ensures the integrity and consistency of the shared features. Furthermore, it detects and prevents malicious activities on the stored data from both outsider and insider threats, it presents the features in a standard format which encourages heterogeneous IDS nodes participation, and finally, it is robust to public IDS nodes joining and leaving the blockchain network.US-Japan binational research community Workshop on Programmable Networking, November 16-18, 2020 (US dates), onlin

    Transpacific Testbed for Real-Time Experimentation

    Get PDF
    The transpacific testbed is a generic routing encapsulation (GRE) tunnel built between CUNY City College (CCNY), USA and Kyushu Institute of Technology (KYUTECH), Japan. The tunnel, built through internet2, originated from CCNY through the JGN network in Seattle and terminated at Kyutech in Japan. The testbed defines the future of the Internet by focusing on addressing research challenges associated with enabling trustworthy networks, supporting the Internet of Things (IoT), which encompasses everything connected to the Internet and cyber-physical systems (CPS) - a controlled mechanism monitored by computer-based algorithms. In this paper, we describe the setting up and testing of the testbed. Furthermore, we describe the real-time experiments conducted on the testbed and present the results. The experiments are classified into two: blockchain-based cooperative intrusion detection system (CoIDS) and Secure Virtual Machine introspection. In each of the experiments, we describe the method and present the results. Finally, we look into the ongoing works of extending the testbed to the COSMIC global testbed.2021 IEEE 4th 5G World Forum (5GWF 2021), 13-15, October, 2021, Virtual Conferenc

    Stream Mining for Network Management

    Get PDF
    Network management is an important issue in maintaining the Internet as an important social infrastructure. Finding excessive consumption of network bandwidth caused by P2P mass flows is especially important. Finding Internet viruses is also an important security issue. Although stream mining techniques seem to be promising techniques to find P2P and Internet viruses, vast network flows prevent the simple application of such techniques. A mining technique which works well with extremely limited memory is required. Also it should have a real-time analysis capability. In this paper, we propose a cache based mining method to realize such a technique. By analyzing the characteristics of the proposed method with real Internet backbone flow data, we show the advantages of the proposed method, i.e. less memory consumption while realizing realtime analysis capability. We also show the fact that we can use the proposed method to find mass flow information from Internet backbone flow data

    Transpacific Testbed for Real-Time Experimentation

    No full text

    Blockchain-based Architecture for Interdomain Cybersecurity Research

    No full text
    We designed and developed a novel application that applies blockchain technology in cybersecurity. This architecture allows different companies to come together to promptly exchange cyberattack information in a secure way to detect coordinated or distributed attacks. In addition to this, the architecture allows the public node to connect to the blockchain network and retrieve the stored attack information in real-time. The processes involved in exchanging the attack information are: (i) extraction of the attack information, (ii) preparing and submitting it as transactions to a blockchain network, (iii) verification of the submitted information, (iv) validation and chaining the transaction to blockchain and (v) distribution to other blockchain nodes. The novelty in the proposed work is that the architecture facilitates scalable and secured attack features exchange and ensures the integrity and consistency of the shared features. Furthermore, it detects and prevents malicious activities on the stored data from both outsider and insider threats, it presents the features in a standard format which encourages heterogeneous IDS nodes participation, and finally, it is robust to public IDS nodes joining and leaving the blockchain network.US-Japan binational research community Workshop on Programmable Networking, November 16-18, 2020 (US dates), onlin

    The location of the bladder neck in postoperative cystography predicts continence convalescence after radical prostatectomy

    No full text
    Abstract Background This study was conducted to determine whether the location of the bladder neck in postoperative cystography predicts recovery of continence after radical prostatectomy. Methods Between 2008 and 2015, 203 patients who underwent laparoscopic radical prostatectomy (LRP, n = 99) and robot assisted radical prostatectomy (RARP, n = 104) were analyzed. The location of the bladder neck was visualized by postoperative routine cystography, and quantitative evaluation of the bladder neck position was performed according to the bladder neck to pubic symphysis (BNPS) ratio proposed by Olgin et al. (J Endourol, 2014). Recovery of continence was defined as no pad use or one security pad per day. To determine the predictive factors for recovery of continence at 1, 3, 6 and 12 months, several parameters were analyzed using logistic regression analysis, including age (≤68 vs. > 68, BMI (≤23.4 vs. > 23.4 kg/m2), surgical procedure (LRP vs. RARP), prostate volume (≤38 vs. > 38 mL), nerve-sparing technique, vesico-urethral anastomosis leakage, and BNPS ratio (≤0.59 vs. > 0.59). Results The mean postoperative follow-up was 1131 days (79–2880). At 1, 3, 6 and 12 months after surgery, continence recovery rates were 25, 53, 68 and 81%, respectively. Although older age (> 68) and RARP were significant risk factors for incontinence within 3 months, neither was significant after 6 months. A high BNPS ratio (> 0.59) was the only significant risk factor for the persistence of incontinence at all observation points, up to 12 months. Conclusions A lower bladder neck position after prostatectomy predicts prolonged incontinence
    corecore