Journal articles on the topic 'Control-oriented attacks'

To see the other types of publications on this topic, follow the link: Control-oriented attacks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Control-oriented attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cheng, Long, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, and Danfeng (Daphne) Yao. "Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–36. http://dx.doi.org/10.1145/3462699.

Full text
Abstract:
Data-oriented attacks manipulate non-control data to alter a program’s benign behavior without violating its control-flow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense mechanisms. However, these threats have not been adequately addressed. In this survey article, we first map data-oriented exploits, including Data-Oriented Programming (DOP) and Block-Oriented Programming (BOP) attacks, to their assumptions/requirements and attack capabilities. Then, we compare known defenses against these attacks, in terms of approach, detection capabilities, overhead, and compatibility. It is generally believed that control flows may not be useful for data-oriented security. However, data-oriented attacks (especially DOP attacks) may generate side effects on control-flow behaviors in multiple dimensions (i.e., incompatible branch behaviors and frequency anomalies). We also characterize control-flow anomalies caused by data-oriented attacks. In the end, we discuss challenges for building deployable data-oriented defenses and open research questions.
APA, Harvard, Vancouver, ISO, and other styles
2

Pisu, Pierluigi, Jim Martin, and Zoleikha Abdollahi Biron. "A Control Oriented Perspective for Security in Connected and Automated Vehicles." Mechanical Engineering 139, no. 12 (December 1, 2017): S17—S20. http://dx.doi.org/10.1115/1.2017-dec-10.

Full text
Abstract:
This article provides an overview of the potential attacks that can impact connected vehicles (CV) technologies and highlights how a resilient control scheme can be effective to mitigate the effect of these attacks by allowing the system to safely operate with reduced performance. CVs endure several challenges that can occur due to cyberattacks with purposes of disrupting the performance of the connected vehicles system. To improve safety and security, advanced vehicular control systems must be designed to be resilient to cyberattacks. The attack detection and switching strategy is formulated as an MPC-like optimization problem, where the control variable is constrained to a specific strategy and applied in a receding horizon fashion. The choice of the cost function plays an important role in the performance of the system. The results of the switching strategy show that in comparison with the perfect case—in which the attacks are perfectly identified and the correct strategy selected immediately—there is approximately a 22 percent strategy improvement that could still be achieved by changing the switching strategy.
APA, Harvard, Vancouver, ISO, and other styles
3

Sánchez, Helem S., Damiano Rotondo, Teresa Escobet, Vicenç Puig, and Joseba Quevedo. "Bibliographical review on cyber attacks from a control oriented perspective." Annual Reviews in Control 48 (2019): 103–28. http://dx.doi.org/10.1016/j.arcontrol.2019.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Jian Hong, and Li Xia Ji. "Shrew Attack on Internet Congestion Control Protocol in Control Engineering." Advanced Materials Research 648 (January 2013): 277–80. http://dx.doi.org/10.4028/www.scientific.net/amr.648.277.

Full text
Abstract:
Low-rate Denial of Service(LDoS) attacks with their hidden,high efficiency features can significantly degrade service performance of large number of connection-oriented services,or even worse,thoroughly deny the services.Shrew attack is a typical LDoS attack.Firstly we studied the basic mechanism of the attack and congestion control.The source of adaptive congestion control mechanism in the security vulnerability was revealed according to the different levels of the intrinsic link between Internet congestion control at TCP layer and IP layer.Secondly,using the Network simulator NS2 software package,we set up attack model to simulate a large number of attack experiments with various congestion control mechanism and algorithms.Finally we draw the conclusions that continuous Shrew attack makes services nearly crash,while congestion control algorithms taking into account of fairness,such as Stochastic Fairness Queuing (SFQ) and Deficit Round Robin (DRR),can effectively suppress such kind of attack.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhardwaj, Akashdeep, Fadi Al-Turjman, Manoj Kumar, Thompson Stephan, and Leonardo Mostarda. "Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems." IEEE Access 8 (2020): 104956–66. http://dx.doi.org/10.1109/access.2020.2998983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tian, Wan Li, Lian Zhong Liu, and Meng Liu. "Roles Generation for Applications in RBAC Model." Applied Mechanics and Materials 411-414 (September 2013): 35–39. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.35.

Full text
Abstract:
RBAC has been widely used for the reason of its efficiency, convenience and safety. But as the traditional user-oriented access control strategy, the RBAC carries the disadvantage of user-oriented access control as well. It always assumes that the application is credible and the behavior of the program represents the wishes of the user. However, this assumption is increasingly proving to be false and numbers of prevalent types of security attacks leverage this weakness to misuse the authority of users. Based on RBAC and learn from the concept of FBAC, this paper will proposed a solution about generating roles for application.
APA, Harvard, Vancouver, ISO, and other styles
7

Delgado, Raimarius, Jaeho Park, Cheonho Lee, and Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System." Applied Sciences 10, no. 8 (April 17, 2020): 2796. http://dx.doi.org/10.3390/app10082796.

Full text
Abstract:
Android is gaining popularity as the operating system of embedded systems and recent demands of its application on industrial control are steadily increasing. However, its feasibility is still in question due to two major drawbacks: safety and security. In particular, ensuring the safe operation of industrial control systems requires the system to be governed by stringent temporal constraints and should satisfy real-time requirements. In this sense, we explore the real-time characteristics of Xenomai to guarantee strict temporal deadlines, and provide a viable method integrating Android processes to real-time tasks. Security is another issue that affects safety due to the increased connectivity in industrial systems provoking a higher risk of cyber and hardware attacks. Herein, we adopted a hardware copy protection chip and enforced administrative security policies in the booting process and the Android application layer. These policies ensure that the developed system is protected from physical tampering and unwanted Android applications. The articulacy of the administrative policies is demonstrated through experiments. The developed embedded system is connected to an industrial EtherCAT motion device network exhibiting operability on an actual industrial application. Real-time performance was evaluated in terms of schedulability and responsiveness, which are critical in determining the safety and reliability of the control system.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang, and Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.

Full text
Abstract:
Recently, industrial control system (ICS) has gradually been a primary attack target. The main reason is that increasing vulnerabilities exposed provide opportunities for launching multistep and multihost attacks to breach security policies. To that end, vulnerability remediations are crucial for the ICS. However, there exist three problems to be tackled in a sound way. First of all, it is impractical to remove all vulnerabilities for preventing the multistep and multihost attacks in the consideration of the actual ICS demands. Secondly, ranking vulnerability remediations lacks a guidance. The last problem is that there is a lack of a metric for qualifying the security level after each remediation. In this paper, an ICS-oriented assessment methodology is proposed for the vulnerability remediations. It consists of three phases corresponding to the above problems, including (1) prioritizing Interdiction Surfaces, (2) ranking vulnerability remediations, and (3) calculating composite metrics. The Interdiction Surface describes a minimum set of vulnerabilities of which the complete removal may interdict all discovered attack paths in the system. Particularly, it innovates to take the urgent security demands of the ICS into account. Subsequently, ranking the vulnerability in the optimal Interdiction Surface is conducive to guide the remediations with the priority. A composite metric is ultimately given to assess the security level after vulnerability remediations. The effectiveness of the proposed methodology is validated in an ICS scenario which is similar to the real-world practice. Results show that the entire procedure is suitable for the context of the ICS. Simultaneously, the composite metric enhances both the comprehensiveness and the compatibility in contrast with attack path-based metrics. Hence, it overcomes the shortcomings when they are used in isolation.
APA, Harvard, Vancouver, ISO, and other styles
9

Baig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (September 6, 2021): 5967. http://dx.doi.org/10.3390/s21175967.

Full text
Abstract:
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authentication and comprehensively discusses its different modes, and issues that these modes have related to security, privacy, and usability. A comparison of privacy-preserving approaches dealing with the privacy issues is provided, and lastly recommendations for secure, privacy-preserving, and user-friendly continuous authentication.
APA, Harvard, Vancouver, ISO, and other styles
10

Genge, Béla, Piroska Haller, Adrian-Vasile Duka, and Hunor Sándor. "A lightweight key generation scheme for end-to-end data authentication in Industrial Control Systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 417–28. http://dx.doi.org/10.1515/auto-2019-0017.

Full text
Abstract:
Abstract The recent advances in technology had an exceptional impact on the performance optimization and the provisioning of more flexible Industrial Control Systems (ICS). Nevertheless, most ICS communication protocols, as they are currently and widely implemented, are extremely vulnerable to various cyber attacks. This paper proposes a lightweight application-oriented data authentication scheme applicable to existing ICS infrastructures by adopting the characteristics and computational advantages of hash functions and hash chains. Extensive experimental results on a Phoenix Contact industrial controller, which runs the control logic of a real ICS implemented in a Romanian gas transportation network, demonstrate the effectiveness of the proposed scheme and its immediate applicability to existing installations.
APA, Harvard, Vancouver, ISO, and other styles
11

Muria, Risky Mezi, Arif Muntasa, Muhammad Yusuf, and Ardi Hamzah. "Studi Litelatur: Peningkatan Kinerja Digital Forensik Dan Pencegahan Cyber Crime." Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) 3, no. 1 (April 30, 2022): 12–20. http://dx.doi.org/10.31102/jatim.v3i1.1422.

Full text
Abstract:
The more complex a problem that arises due to an ease in information technology makes cyberattacks increasingly dangerous and dangerous for systems within a country or entity. Crimes thatarise must be detected and a preventive action taken immediately so that no party is harmed for atechnological crime. This study aims to find various methods to review and investigate cyberattacks for security in digital forensics and can provide input and additional insight to all partiesincluding investigators or practitioners and users in the field of digital forensics about variousmethods that can be used to detect and prevent cyber attacks. This research was conducted byconducting a literature study of various studies on cyber attacks. The research method used isdescriptive qualitative method by taking data from literacy studies on research on cyber attacks.The results of the literature study show that the factors that can improve the performance of digitalforensics are the Digital Forensics Framework For Reviewing And Investigating Cyber Attacks(D4I), holistic digital organization, biometric authentication with image forensics schemes, largescale interconnection systems, LSS control architecture, system network control (AE-Safe), DigitalForensic Readiness Index (DiFRI), LEChain, Verification Of Digital Evidence (VODE)Framework, Capsule of Digital Evidence (CODE), The Phase-oriented Advice and ReviewStructure (PARS), IEEE-system 14 and IEEE-39 stability control, Cyber-Physical System (CPS),STPA-SafeSec, Digital Evidence Reporting and Decision Support (DERDS), ExperDF-CM modeland Argumentation-Based Reasoner (ABR)
APA, Harvard, Vancouver, ISO, and other styles
12

Zafar, Faheem, Abid Khan, Saif Ur Rehman Malik, Mansoor Ahmed, Carsten Maple, and Adeel Anjum. "MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus." Sensors 21, no. 15 (July 28, 2021): 5096. http://dx.doi.org/10.3390/s21155096.

Full text
Abstract:
Smart devices have accentuated the importance of geolocation information. Geolocation identification using smart devices has paved the path for incentive-based location-based services (LBS). However, a user’s full control over a smart device can allow tampering of the location proof. Witness-oriented location proof systems (LPS) have emerged to resist the generation of false proofs and mitigate collusion attacks. However, witness-oriented LPS are still susceptible to three-way collusion attacks (involving the user, location authority, and the witness). To overcome the threat of three-way collusion in existing schemes, we introduce a decentralized consensus protocol called MobChain in this paper. In this scheme the selection of a witness and location authority is achieved through a distributed consensus of nodes in an underlying P2P network that establishes a private blockchain. The persistent provenance data over the blockchain provides strong security guarantees; as a result, the forging and manipulation of location becomes impractical. MobChain provides secure location provenance architecture, relying on decentralized decision making for the selection of participants of the protocol thereby addressing the three-way collusion problem. Our prototype implementation and comparison with the state-of-the-art solutions show that MobChain is computationally efficient and highly available while improving the security of LPS.
APA, Harvard, Vancouver, ISO, and other styles
13

Madrid, Antonio, Mar Joanpere, Lena de Botton, and Roger Campdepadrós. "Media Manipulation Against Social Justice Researchers: Second-Order Sexual Harassment." Qualitative Inquiry 26, no. 8-9 (July 10, 2020): 983–88. http://dx.doi.org/10.1177/1077800420938853.

Full text
Abstract:
According to scientific studies, manipulation, which is a key concept in critical discourse analyses, is used to gain control of power against those who act to promote transformations oriented toward social justice. In the case of the struggle against sexual harassment, attacks against people supporting the victims constitute second-order sexual harassment. In this article, we analyze a specific case of media manipulation aiming to silence the brave people who dared speak about gender violence at Spanish universities and acted toward eliminating violence at these universities. Most individuals who had assumed a position against gender violence have been professionally and personally attacked and destroyed by structural powers. In this article, we focus on two aspects. First, we analyze how the group that broke the silence in Spain managed to overcome the attacks by the yellow press. Second, we observe how this group achieved increasing social impact by transforming the universities and gaining the support of their family members, social movements, and most journalists. We performed this analysis using communicative methodology, including interviews with the relatives of the brave people who suffered second-order sexual harassment by certain media and compromised journalists. According to their relatives, by contributing to social justice, their families also improved their lives and family relationships.
APA, Harvard, Vancouver, ISO, and other styles
14

Gupta, Kirti, Subham Sahoo, Bijaya Ketan Panigrahi, Frede Blaabjerg, and Petar Popovski. "On the Assessment of Cyber Risks and Attack Surfaces in a Real-Time Co-Simulation Cybersecurity Testbed for Inverter-Based Microgrids." Energies 14, no. 16 (August 12, 2021): 4941. http://dx.doi.org/10.3390/en14164941.

Full text
Abstract:
The integration of variable distributed generations (DGs) and loads in microgrids (MGs) has made the reliance on communication systems inevitable for information exchange in both control and protection architectures to enhance the overall system reliability, resiliency and sustainability. This communication backbone in turn also exposes MGs to potential malicious cyber attacks. To study these vulnerabilities and impacts of various cyber attacks, testbeds play a crucial role in managing their complexity. This research work presents a detailed study of the development of a real-time co-simulation testbed for inverter-based MGs. It consists of a OP5700 real-time simulator, which is used to emulate both the physical and cyber layer of an AC MG in real time through HYPERSIM software; and SEL-3530 Real-Time Automation Controller (RTAC) hardware configured with ACSELERATOR RTAC SEL-5033 software. A human–machine interface (HMI) is used for local/remote monitoring and control. The creation and management of HMI is carried out in ACSELERATOR Diagram Builder SEL-5035 software. Furthermore, communication protocols such as Modbus, sampled measured values (SMVs), generic object-oriented substation event (GOOSE) and distributed network protocol 3 (DNP3) on an Ethernet-based interface were established, which map the interaction among the corresponding nodes of cyber-physical layers and also synchronizes data transmission between the systems. The testbed not only provides a real-time co-simulation environment for the validation of the control and protection algorithms but also extends to the verification of various detection and mitigation algorithms. Moreover, an attack scenario is also presented to demonstrate the ability of the testbed. Finally, challenges and future research directions are recognized and discussed.
APA, Harvard, Vancouver, ISO, and other styles
15

Park, SeongJu, and Nam-Ho Kim. "Manufacture artificial intelligence education kit using Jetson Nano and 3D printer." Korean Institute of Smart Media 11, no. 11 (December 31, 2022): 40–48. http://dx.doi.org/10.30693/smj.2022.11.11.40.

Full text
Abstract:
In this paper, an educational kit that can be used in AI education was developed to solve the difficulties of AI education. Through this, object detection and person detection in computer vision using CNN and OpenCV to learn practical-oriented experiences from theory-centered and user image recognition (Your Own) that learns and recognizes specific objects Image Recognition), user object classification (Segmentation) and segmentation (Classification Datasets), IoT hardware control that attacks the learned target, and Jetson Nano GPIO, an AI board, are developed and utilized to develop and utilize textbooks that help effective AI learning made it possible.
APA, Harvard, Vancouver, ISO, and other styles
16

NOONAN, ALEXANDER. "“What Must Be the Answer of the United States to Such a Proposition?” Anarchist Exclusion and National Security in the United States, 1887–1903." Journal of American Studies 50, no. 2 (February 16, 2016): 347–76. http://dx.doi.org/10.1017/s0021875816000451.

Full text
Abstract:
This article examines the debates around anarchist restriction that shaped the eventual passage of the Immigration Act of 1903 and argues that domestically oriented conceptions of national security are both challenged and constituted by transnational and international processes and currents. While discussions of transnational immigration control became important features of both scholarly discourse and popular debate in the wake of the terrorist attacks of 2001, these discussions were not new. Similar debates about immigration policy, security, and civil liberties shaped discussions between the mid-1880s and early 1900s, when an unprecedented wave of attacks against heads of state fed rumors of wide-ranging conspiracies, and reports of anarchist outrages in cities far and wide spread fear. Anarchist exclusion was far more than an example of a rising nativist tide raising all boats and excluding a widening spectrum of undesirable aliens. Such measures set the foundation for restriction based on political beliefs and associations that, over subsequent decades, would become critical to suppressing political dissent. Consequently, understanding how the fear of anarchist violence helped shape the contours of the domestic and diplomatic debates over anarchist restriction is critical as these old questions of transnational immigration control reemerge.
APA, Harvard, Vancouver, ISO, and other styles
17

Tsoupidi, Rodothea Myrsini, Roberto Castañeda Lozano, and Benoit Baudry. "Constraint-based Diversification of JOP Gadgets." Journal of Artificial Intelligence Research 72 (December 29, 2021): 1471–505. http://dx.doi.org/10.1613/jair.1.12848.

Full text
Abstract:
Modern software deployment process produces software that is uniform, and hence vulnerable to large-scale code-reuse attacks, such as Jump-Oriented Programming (JOP) attacks. Compiler-based diversification improves the resilience and security of software systems by automatically generating different assembly code versions of a given program. Existing techniques are efficient but do not have a precise control over the quality, such as the code size or speed, of the generated code variants. This paper introduces Diversity by Construction (DivCon), a constraint-based compiler approach to software diversification. Unlike previous approaches, DivCon allows users to control and adjust the conflicting goals of diversity and code quality. A key enabler is the use of Large Neighborhood Search (LNS) to generate highly diverse assembly code efficiently. For larger problems, we propose a combination of LNS with a structural decomposition of the problem. To further improve the diversification efficiency of DivCon against JOP attacks, we propose an application-specific distance measure tailored to the characteristics of JOP attacks. We evaluate DivCon with 20 functions from a popular benchmark suite for embedded systems. These experiments show that DivCon's combination of LNS and our application-specific distance measure generates binary programs that are highly resilient against JOP attacks (they share between 0.15% to 8% of JOP gadgets) with an optimality gap of 10%. Our results confirm that there is a trade-off between the quality of each assembly code version and the diversity of the entire pool of versions. In particular, the experiments show that DivCon is able to generate binary programs that share a very small number of gadgets, while delivering near-optimal code. For constraint programming researchers and practitioners, this paper demonstrates that LNS is a valuable technique for finding diverse solutions. For security researchers and software engineers, DivCon extends the scope of compiler-based diversification to performance-critical and resource-constrained applications.
APA, Harvard, Vancouver, ISO, and other styles
18

Liagkou, Vasiliki, Vasileios Kavvadas, Spyridon K. Chronopoulos, Dionysios Tafiadis, Vasilis Christofilakis, and Kostas P. Peppas. "Attack Detection for Healthcare Monitoring Systems Using Mechanical Learning in Virtual Private Networks over Optical Transport Layer Architecture." Computation 7, no. 2 (May 5, 2019): 24. http://dx.doi.org/10.3390/computation7020024.

Full text
Abstract:
Data security plays a crucial role in healthcare monitoring systems, since critical patient information is transacted over the Internet, especially through wireless devices, wireless routes such as optical wireless channels, or optical transport networks related to optical fibers. Many hospitals are acquiring their own metro dark fiber networks for collaborating with other institutes as a way to maximize their capacity to meet patient needs, as sharing scarce and expensive assets, such as scanners, allows them to optimize their efficiency. The primary goal of this article is to develop of an attack detection model suitable for healthcare monitoring systems that uses internet protocol (IP) virtual private networks (VPNs) over optical transport networks. To this end, this article presents the vulnerabilities in healthcare monitoring system networks, which employ VPNs over optical transport layer architecture. Furthermore, a multilayer network architecture for closer integration of the IP and optical layers is proposed, and an application for detecting DoS attacks is introduced. The proposed application is a lightweight implementation that could be applied and installed into various remote healthcare control devices with limited processing and memory resources. Finally, an analytical and focused approach correlated to attack detection is proposed, which can also serve as a tutorial oriented towards even nonprofessionals for practical and learning purposes.
APA, Harvard, Vancouver, ISO, and other styles
19

Kosmowski, Kazimierz T., Emilian Piesik, Jan Piesik, and Marcin Śliwiński. "Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management." Energies 15, no. 10 (May 15, 2022): 3610. http://dx.doi.org/10.3390/en15103610.

Full text
Abstract:
This article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing systems and process plants can, however, create management impediments due to the openness of these technologies to external systems and networks via various communication channels. This makes company assets and resources potentially vulnerable to risks, e.g., due to cyber-attacks. In the BCM-oriented approach proposed here, both preventive and recovery activities are considered in light of engineering best practices and selected international standards, reports, and domain publications.
APA, Harvard, Vancouver, ISO, and other styles
20

Ustun, Taha Selim, S. M. Suhail Hussain, Ahsen Ulutas, Ahmet Onen, Muhammad M. Roomi, and Daisuke Mashima. "Machine Learning-Based Intrusion Detection for Achieving Cybersecurity in Smart Grids Using IEC 61850 GOOSE Messages." Symmetry 13, no. 5 (May 8, 2021): 826. http://dx.doi.org/10.3390/sym13050826.

Full text
Abstract:
Increased connectivity is required to implement novel coordination and control schemes. IEC 61850-based communication solutions have become popular due to many reasons—object-oriented modeling capability, interoperable connectivity and strong communication protocols, to name a few. However, communication infrastructure is not well-equipped with cybersecurity mechanisms for secure operation. Unlike online banking systems that have been running such security systems for decades, smart grid cybersecurity is an emerging field. To achieve security at all levels, operational technology-based security is also needed. To address this need, this paper develops an intrusion detection system for smart grids utilizing IEC 61850’s Generic Object-Oriented Substation Event (GOOSE) messages. The system is developed with machine learning and is able to monitor the communication traffic of a given power system and distinguish normal events from abnormal ones, i.e., attacks. The designed system is implemented and tested with a realistic IEC 61850 GOOSE message dataset under symmetric and asymmetric fault conditions in the power system. The results show that the proposed system can successfully distinguish normal power system events from cyberattacks with high accuracy. This ensures that smart grids have intrusion detection in addition to cybersecurity features attached to exchanged messages.
APA, Harvard, Vancouver, ISO, and other styles
21

Huang, Ning, Shuguang Huang, and Chao Chang. "Automatic Generation of ROP Through Static Instructions Assignment and Dynamic Memory Analysis." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 57–76. http://dx.doi.org/10.4018/ijdcf.2021030104.

Full text
Abstract:
W⊕X is a protection mechanism against control-flow hijacking attacks. Return-oriented programming (ROP) can perform a specific function by searching for appropriate assembly instruction fragments (gadgets) in a code segment and bypass the W⊕X. However, manual search for gadgets that match the conditions is inefficient, with high error and missing rates. In order to improve the efficiency of ROP generation, the authors propose an automatic generation method based on a fragmented layout called automatic generation of ROP. This method designs new intermediate instruction construction rules based on an automatic ROP generation framework Q, uses symbolic execution to analyze program memory states and construct data constraints for multi-modules ROP, and solves ROP data constraints to generate test cases of an ROP chain. Experiments show that this method can effectively improve the space efficiency of the ROP chain and lower the requirements of the ROP layout on memory conditions.
APA, Harvard, Vancouver, ISO, and other styles
22

Newman, Lena. "Nicholas S. Paliewicz and Marouf Hasian Jr. The Securitization of Memorial Space: Rhetoric and Public Memory." RBM: A Journal of Rare Books, Manuscripts, and Cultural Heritage 21, no. 1 (May 29, 2020): 42. http://dx.doi.org/10.5860/rbm.21.1.42.

Full text
Abstract:
In The Securitization of Memorial Space: Rhetoric and Public Memory, Nicholas S. Paliewicz and Marouf Hasian Jr. train a darkly analytical lens on New York City’s Ground Zero in the aftermath of September 11, 2001 terrorist attacks on the World Trade Center, and the debate around how to memorialize the events of that day. The authors explore how various objects at Ground Zero were infused with political meaning and deployed like weapons by myriad actors in both the smaller battle for control of the National September 11 Memorial and Museum and the larger Global War on Terror. Hasian and Paliewicz are writing from backgrounds in rhetorical and critical security studies, and at times their writing can be a little opaque to those not fluent in the vocabulary of those fields. The authors also describe their approach as “object oriented,” a methodology that should sound familiar to anyone working in special collections today (23).
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Yongsoo, Eungyu Lee, and Taejin Lee. "Human-Centered Efficient Explanation on Intrusion Detection Prediction." Electronics 11, no. 13 (July 2, 2022): 2082. http://dx.doi.org/10.3390/electronics11132082.

Full text
Abstract:
The methodology for constructing intrusion detection systems and improving existing systems is being actively studied in order to detect harmful data within large-capacity network data. The most common approach is to use AI systems to adapt to unanticipated threats and improve system performance. However, most studies aim to improve performance, and performance-oriented systems tend to be composed of black box models, whose internal working is complex. In the field of security control, analysts strive for interpretation and response based on information from given data, system prediction results, and knowledge. Consequently, performance-oriented systems suffer from a lack of interpretability owing to the lack of system prediction results and internal process information. The recent social climate also demands a responsible system rather than a performance-focused one. This research aims to ensure understanding and interpretation by providing interpretability for AI systems in multiple classification environments that can detect various attacks. In particular, the better the performance, the more complex and less transparent the model and the more limited the area that the analyst can understand, the lower the processing efficiency accordingly. The approach provided in this research is an intrusion detection methodology that uses FOS based on SHAP values to evaluate if the prediction result is suspicious and selects the optimal rule from the transparent model to improve the explanation.
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Sungbin, and Jeonghun Cho. "ACE-M: Automated Control Flow Integrity Enforcement Based on MPUs at the Function Level." Electronics 11, no. 6 (March 15, 2022): 912. http://dx.doi.org/10.3390/electronics11060912.

Full text
Abstract:
Control-flow integrity(CFI) ensures that the execution flow of a program follows the control-flow graph(CFG) determined at compile time. CFI is a security technique designed to prevent runtime attacks such as return-oriented programming (ROP). With the development of the Internet of Things (IoT), the number of embedded devices has increased, and security and protection techniques in embedded systems have become important. Since the hardware-based CFI technique requires separate hardware support, it is difficult to apply to an embedded device that is already arranged. In this paper, we propose a function-level CFI technique named ACE-M, which uses the memory protection unit (MPU) included in most embedded devices. MPU may provide attributes such as read-write-execute to the memory area. ACE-M has three steps: (1) initiate—inserts an MPU-related function into a specific position; (2) profiling—provides information for MPU configuration. After the initation step, several pieces of information can be determined; (3) set—modify the already-inserted function’s arguments. We propose a design that supports the MPU. In our model, the MPU becomes a control flow monitor that detects control flow errors(CFEs), and the inserted codes cause the MPU to act as a control flow checker. If the program deviates from the original control flow, the MPU raises an exception since its corresponding area will not be included in the executable area. This approach not only verifies the target address but also guarantees the running position. Our technique can detect any modification of the program counter (PC) to an arbitrary address.
APA, Harvard, Vancouver, ISO, and other styles
25

Qiao, Yanchen, Bin Zhang, Weizhe Zhang, Arun Kumar Sangaiah, and Hualong Wu. "DGA Domain Name Classification Method Based on Long Short-Term Memory with Attention Mechanism." Applied Sciences 9, no. 20 (October 9, 2019): 4205. http://dx.doi.org/10.3390/app9204205.

Full text
Abstract:
Currently, many cyberattacks use the Domain Generation Algorithm (DGA) to generate random domain names, so as to maintain communication with the Communication and Control (C&C) server. Discovering DGA domain names in advance could help to detect attacks and response in time. However, in recent years, the General Data Protection Regulation (GDPR) has been promulgated and implemented, and the method of DGA classification based on the context information, such as the WHOIS (the information about the registered users or assignees of the domain name) , is no longer applicable. At the same time, acquiring the DGA algorithm by reversing malware samples encounters the problem of no malware samples for various reasons, such as fileless malware. We propose a DGA domain name classification method based on Long Short-Term Memory (LSTM) with attention mechanism. This method is oriented to the character sequence of the domain name, and it uses the LSTM combined with attention mechanism to construct the DGA domain name classifier to achieve the rapid classification of domain names. The experimental results show that the method has a good classification result.
APA, Harvard, Vancouver, ISO, and other styles
26

NEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.

Full text
Abstract:
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. Software analysis has been successful in tackling many such concerns, albeit on other platforms, such as desktop and server. To fill this gap, he have developed infrastructural tools that permit a wide range of software analyses for the Android smartphone platform. Developing these tools has required surmounting many challenges unique to the smartphone platform: dealing with input non-determinism in sensor-oriented apps, non-standard control ow, low-overhead yet high-fidelity record-and-replay. Our tools can analyze substantial, widely-popular apps running directly on smartphones, and do not require access to the app’s source code. We will first present two tools (automated exploration, record-and-replay) that increase Android app reliability by allowing apps to be explored automatically, and bugs replayed or isolated. Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious apps; app profiling to summarize app behavior; and Moving Target Defense for thwarting attacks.
APA, Harvard, Vancouver, ISO, and other styles
27

Ellemor, Heidi, and Jon Barnett. "National Security and Emergency Management after September 11." International Journal of Mass Emergencies & Disasters 23, no. 3 (November 2005): 5–26. http://dx.doi.org/10.1177/028072700502300301.

Full text
Abstract:
The terrorist attacks in New York on September 11 2001 have troubled the practice of security. There has been renewed emphasis on the need for a layered security strategy, and this has refocused attention on civil defense. As a consequence, emergency management institutions are increasingly being incorporated under the aegis of ‘national security’. This is resulting in the implementation of older command-and-control type models of emergency management at the expense of the prevention-oriented, preparedness and community based approaches that emerged after the end of the Cold War. The paper situates this recent convergence of security and emergency management in a discussion of the evolution of both policy fields since the end of WWII. It then explains the post- September 11 trend towards centralizing authority in emergency management in Australia, but with considerable reference to parallel developments in the United States. The paper argues that while this retrogressive shift seems inimical to contemporary advances in emergency management, an inclusive interpretation of security—as human security—could serve to reinforce the important developments made in the field of emergency management in the last decade.
APA, Harvard, Vancouver, ISO, and other styles
28

Elbez, Ghada, Hubert B. Keller, Atul Bohara, Klara Nahrstedt, and Veit Hagenmeyer. "Detection of DoS Attacks Using ARFIMA Modeling of GOOSE Communication in IEC 61850 Substations." Energies 13, no. 19 (October 5, 2020): 5176. http://dx.doi.org/10.3390/en13195176.

Full text
Abstract:
Integration of Information and Communication Technology (ICT) in modern smart grids (SGs) offers many advantages including the use of renewables and an effective way to protect, control and monitor the energy transmission and distribution. To reach an optimal operation of future energy systems, availability, integrity and confidentiality of data should be guaranteed. Research on the cyber-physical security of electrical substations based on IEC 61850 is still at an early stage. In the present work, we first model the network traffic data in electrical substations, then, we present a statistical Anomaly Detection (AD) method to detect Denial of Service (DoS) attacks against the Generic Object Oriented Substation Event (GOOSE) network communication. According to interpretations on the self-similarity and the Long-Range Dependency (LRD) of the data, an Auto-Regressive Fractionally Integrated Moving Average (ARFIMA) model was shown to describe well the GOOSE communication in the substation process network. Based on this ARFIMA-model and in view of cyber-physical security, an effective model-based AD method is developed and analyzed. Two variants of the statistical AD considering statistical hypothesis testing based on the Generalized Likelihood Ratio Test (GLRT) and the cumulative sum (CUSUM) are presented to detect flooding attacks that might affect the availability of the data. Our work presents a novel AD method, with two different variants, tailored to the specific features of the GOOSE traffic in IEC 61850 substations. The statistical AD is capable of detecting anomalies at unknown change times under the realistic assumption of unknown model parameters. The performance of both variants of the AD method is validated and assessed using data collected from a simulation case study. We perform several Monte-Carlo simulations under different noise variances. The detection delay is provided for each detector and it represents the number of discrete time samples after which an anomaly is detected. In fact, our statistical AD method with both variants (CUSUM and GLRT) has around half the false positive rate and a smaller detection delay when compared with two of the closest works found in the literature. Our AD approach based on the GLRT detector has the smallest false positive rate among all considered approaches. Whereas, our AD approach based on the CUSUM test has the lowest false negative rate thus the best detection rate. Depending on the requirements as well as the costs of false alarms or missed anomalies, both variants of our statistical detection method can be used and are further analyzed using composite detection metrics.
APA, Harvard, Vancouver, ISO, and other styles
29

Adler, Aaron, Peter Samouelian, Michael Atighetchi, and Yat Fu. "Remote Management of Boundary Protection Devices with Information Restrictions." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9398–403. http://dx.doi.org/10.1609/aaai.v33i01.33019398.

Full text
Abstract:
Boundary Protection Devices (BPDs) are used by US Government mission partners to regulate the flow of information across networks of differing security levels. BPDs provide several critical functions, including preventing unauthorized sharing, sanitizing information, and preventing cyber attacks. Their application in national security and critical infrastructure environments (e.g., military missions, nuclear power plants, clean water distribution systems) calls for a comprehensive load monitoring system that provides resilience and scalability, as well as an automated and vendor neutral configuration management system that can efficiently respond to security threats at machine speed. Their design as one-way traffic control systems, however, presents challenges for dynamic load adaptation techniques that require access to application server performance metrics across network boundaries. Moreover, the structured review and approval process that regulates their configuration and use presents two significant challenges: (1) Adaptation techniques that alter the configuration of BPDs must be predictable, understandable, and pre-approved by administrators, and (2) Software can be installed on BPDs only after completing a stringent accreditation process. These challenges often lead to manual configuration management practices, which are inefficient or ineffective in many cases. The Hammerhead prototype, developed as part of the SHARC project, addresses these challenges using knowledge representation, a rule-oriented adaptation bundle format, and an extensible, open-source constraint solver.
APA, Harvard, Vancouver, ISO, and other styles
30

Farooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (July 1, 2019): 2536. http://dx.doi.org/10.3390/en12132536.

Full text
Abstract:
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability. Generic Object-Oriented Substation Event (GOOSE) and Sample Value (SV) messages developed according to IEC 61850 enable efficient monitoring and operation control of SAS. IEC 61850 is very popular due to its flexible and robust modeling. As the number of critical infrastructures that employed IEC 61850 increases, it is important to study cybersecurity aspects as well. To this end, this paper develops a software framework, S-GoSV (Secure GOOSE and SV), that generates custom GOOSE and Sample Value messages. Furthermore, security features are added to protect them from different security attacks within a substation. IEC 62351-6 specifies digital signatures to achieve node authentication and messages integrity. Therefore, S-GoSV implements RSASSA-PKCS1-v1_5 digital signature algorithm based on RFC 2313. Performance studies show that digital signature algorithms based on RSA signing and verification take long times and do not conform to timing requirements stipulated by IEC 61850 for power system communication. To address this, Message Authentication Code (MAC) based digital signature algorithm, Keyed Hash-Message Authentication Code- Secure Hash Algorithm (HMAC-SHA256), is additionally implemented in S-GoSV framework for securing GOOSE messages.
APA, Harvard, Vancouver, ISO, and other styles
31

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz, and Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems." Journal of Industrial Engineering and Management 11, no. 2 (April 6, 2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Full text
Abstract:
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal.Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines.Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section.Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.
APA, Harvard, Vancouver, ISO, and other styles
32

Semenykhina, Olena V., and Yuliia О. Rudenko. "ПРОБЛЕМИ НАВЧАННЯ ПРОГРАМУВАТИ УЧНІВ СТАРШИХ КЛАСІВ ТА ШЛЯХИ ЇХ ПОДОЛАННЯ." Information Technologies and Learning Tools 66, no. 4 (September 30, 2018): 54. http://dx.doi.org/10.33407/itlt.v66i4.2149.

Full text
Abstract:
Globalization and informatization of the world economy, modernization of production, development and distribution of computer technologies pose new challenges in education. One of such tasks is to provide qualitative teaching of programming for schoolchildren. The article covers actual issues related to teach computer programming for schoolchildren, psychological difficulties, accompanying training, and ways to overcome them. The reason for the problem is that the school and university discipline curricula are lagging behind from the modern stage of computer technologies development. The article has emphasized the importance of programming skills, as it contributes to the cognitive development of students, the ability to concentrate on problem solving activities, the algorithmic thinking and the ability to follow the algorithm. The objective of the research was to analyze the results of a pedagogical experiment on the effective ways in teaching computer programming to pupils in general education schools. The article presents the results of a two-year pedagogical experiment which consists of ascertaining and formative phases. The research has studied the efficiency of computer programming instructions. The authors have arrived at conclusions that such pedagogical methods and techniques as the use of pupil-oriented social and informative motives, verbal and non-verbal, external and internal learning resources, communicative attacks, relevant stimulation and psychological approach; game techniques; team working, as well as pupils’ independent work and reflection have improved the learning outcomes of computer programming at school. The positive effect of the implemented methods is evidenced by the results in the experimental and control groups of schoolchildren verified by the methods of mathematical statistics.
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Song, Qian Zou, and Wei Huang. "VPN Packet Loss-Oriented Dynamic Control." Applied Mechanics and Materials 340 (July 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amm.340.710.

Full text
Abstract:
Through security protocols and virtual private network tunneling for data confidentiality, message integrity, and endpoint authentication. Users can access anywhere Internet VPN service within the group. VPN tunneling technology VPN gateway group is exposed to internal services in the Internet, malicious users are using client terminal allows officers to attack the internal services group. So we must study to the control is based on the model, combined with VPN network traffic characteristics, the topological feature model of security and safety technology and related technologies. Study on dynamic access control packet loss model in this article, you can study can greatly increase VPN security, confidentiality of data on. Due to the introduction of the concept of dynamic control, we can more accurately control the packet loss and improve system performance.
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Shudong, Yanshan Chen, Xiaobo Wu, Xiaochun Cheng, and Zhihong Tian. "Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors." Journal of Sensors 2021 (June 26, 2021): 1–12. http://dx.doi.org/10.1155/2021/8820413.

Full text
Abstract:
In our paper, we study the vulnerability in cascading failures of the real-world network (power grid) under intentional attacks. Here, we use three indexes ( B , K , k -shell) to measure the importance of nodes; that is, we define three attacks, respectively. Under these attacks, we measure the process of cascade effect in network by the number of avalanche nodes, the time steps, and the speed of the cascade propagation. Also, we define the node’s bearing capacity as a tolerant parameter to study the robustness of the network under three attacks. Taking the power grid as an example, we have obtained a good regularity of the collapse of the network when the node’s affordability is low. In terms of time and speed, under the betweenness-based attacks, the network collapses faster, but for the number of avalanche nodes, under the degree-based attack, the number of the failed nodes is highest. When the nodes’ bearing capacity becomes large, the regularity of the network’s performances is not obvious. The findings can be applied to identify the vulnerable nodes in real networks such as wireless sensor networks and improve their robustness against different attacks.
APA, Harvard, Vancouver, ISO, and other styles
35

Lubkin, Ivan, and Vyacheslav Zolotarev. "Comprehensive Defense System against Vulnerabilities Based on Return-Oriented Programming." Informatics and Automation 21, no. 2 (November 16, 2021): 275–310. http://dx.doi.org/10.15622/ia.21.2.3.

Full text
Abstract:
It is difficult or impossible to develop software without included errors. Errors can lead to an abnormal order of machine code execution during data transmission to a program. Program splitting into routines causes possible attacks by using return instructions from these routines. Most of existing security tools need to apply program source codes to protect against such attacks. The proposed defensive method is intended to a comprehensive solution to the problem. Firstly, it makes it difficult for an attacker to gain control over program execution, and secondly, the number of program routines, which can be used during the attack, decreases. Specific security code insertion is used at the beginning and end of the routines to make it complicated to gain control over the program execution. The return address is kept secure during a call of the protected routine, and the protected routine is restored after its execution if it was damaged by the attacker. To reduce the number of suitable routines for attacks, it was suggested to use synonymous substitutions of instructions that contain dangerous values. It should be mentioned that proposed defensive measures do not affect the original application`s algorithm. To confirm the effectiveness of the described defensive method, software implementation and its testing were accomplished. Acknowledging controls were conducted using synthetic tests, performance tests and real programs. Results of testing have demonstrated the reliability of the proposed measures. It ensures the elimination of program routines suitable for attacks and ensures the impossibility of using standard return instructions for conducting attacks. Performance tests have shown a 14 % drop in the operating speed, which approximately matches the level of the nearest analogues. The application of the proposed solution declines the number of possible attack scenarios, and its applicability level is higher in comparison with analogues.
APA, Harvard, Vancouver, ISO, and other styles
36

Suryawardani, I. Gusti Ayu Oka, and Agung Suryawan Wiranatha. "DIGITAL MARKETING IN PROMOTING EVENTS AND FESTIVITIES. A CASE OF SANUR VILLAGE FESTIVAL." Journal of Business on Hospitality and Tourism 2, no. 1 (January 6, 2017): 159. http://dx.doi.org/10.22334/jbhost.v2i1.51.

Full text
Abstract:
Digital marketing intends to influence consumers’ desire, cognition, feelings, belief, attitude and image concerning products and brands which has the ultimate goal to influence consumers’ purchase behaviour. Digital marketing has been widely used to promote tourism around the world, including Sanur Village Festival in Bali. Sanur Village Festival is one of the famous events in Bali which has been held annually since year 2005 in order to recover image and reputation of Bali as a peaceful destination after terrorism attacks. Research was designed to examine the role of digital marketing in visitors’ behavioural intention in visiting Sanur Village Festival 2015. Research was undertaken in the area of Sanur Village Festival (SVF) on 26 - 30 August 2015. The number of respondents was 207 visitors. Data was analysed by using SmartPLS program.The results show that among four indicators, only indicator of event advertisement significantly influences visitors’ intention in visiting SVF with Alpha Cronbach coefficient is 0.59 (≥ 0.6) and correlation coefficient is 0.369 (≥ 0.3). Meanwhile, three other indicators, namely source of event’s information, accompany to visit, and event’s arrangement is not significant to influence visitors’ intention to visit SVF. Among types of advertisement, the results show that the highest percentage of advertisement’s type which affected the visitors’ intention to visit SVF is the use of digital advertisement, namely television (41.2%), internet (32.7%), and broadcast (13.4%). However, non-digital advertisement has less influence, namely printed media (4.8%), banner (4.5%) and brochure (3.4%). Understanding development of preferred weblogs and portals by internet users is very important to be able to get more success in gaining specific target market, as people are getting more internets oriented. The results indicate that successful promotional strategy in the information and technological era should be focused on digital marketing with a clear focus on efficiency, sustainability and experiences enrichment. However, it cannot be denied that other factors such as attitudes toward behaviour and perceived behaviour control are also defining factors in influencing consumers’ purchase behaviour which is also need to be focused on.
APA, Harvard, Vancouver, ISO, and other styles
37

Vijayalakshmi, R., and N. Duraipandian. "Service oriented architecture and privacy preserving mashup of healthcare data." International Journal of Engineering & Technology 3, no. 3 (July 9, 2014): 337. http://dx.doi.org/10.14419/ijet.v3i3.2139.

Full text
Abstract:
Mashup of health care data from different medical sources must be privacy preserved since the data recipient and/or the data provider may not always be a trusted party. Raw medical data contains person specific sensitive information like ailment, surgery etc. and hence it is susceptible to certain privacy attacks such as attribute linkage and record linkage. There are different privacy models to thwart the privacy attacks. This paper illustrates how to vertically integrate the data from mental health clinic and National AIDS Control Organization (NACO) and preserve privacy using the LKC privacy model. Keywords: Mashup, Linkage, Anonymize Utility, Diversity, Adversary, Interoperability.
APA, Harvard, Vancouver, ISO, and other styles
38

Kolosok, Irina, and Liudmila Gurina. "Cyber Security-Oriented Smart Grid State Estimation." E3S Web of Conferences 69 (2018): 02004. http://dx.doi.org/10.1051/e3sconf/20186902004.

Full text
Abstract:
Development of Smart Grid involves the introduction of Wide Area Measurement System (WAMS), which provides the use of information, computing and digital technologies for measuring, transmitting and processing operating parameters when solving control problems. In this regard, the increased vulnerability to cyberattacks of the control system was noted. The control of Smart Grid includes monitoring, forecasting and planning of the system operation based on its Electric Power System state estimation results. Therefore, the goal of the paper is to develop a mathematical instrument to bad data detection under cyberattacks. Particular attention is paid to false data injection attacks which result in distortion of state variables estimates. The result of the research is an algorithm developed for state estimation based on the interior point method and test equation obtained by Crout matrix decomposition. The obtained results showed effectiveness of the algorithm in state estimation.
APA, Harvard, Vancouver, ISO, and other styles
39

Shafae, Mohammed S., Lee J. Wells, and Gregory T. Purdy. "Defending against product-oriented cyber-physical attacks on machining systems." International Journal of Advanced Manufacturing Technology 105, no. 9 (May 24, 2019): 3829–50. http://dx.doi.org/10.1007/s00170-019-03805-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Shafae, Mohammed S., Lee J. Wells, and Gregory T. Purdy. "Correction to: Defending against product-oriented cyber-physical attacks on machining systems." International Journal of Advanced Manufacturing Technology 105, no. 9 (November 22, 2019): 3851–52. http://dx.doi.org/10.1007/s00170-019-04576-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Villagrá, Victor A. "Advanced Cybersecurity Services Design." Electronics 11, no. 18 (September 6, 2022): 2803. http://dx.doi.org/10.3390/electronics11182803.

Full text
Abstract:
Cybersecurity technologies have been researched extensively in the last few years in order to face the current threat landscape, which has shown a continuous growth in the quality and quantity of attacks that are oriented toward any potentially vulnerable items (people, software, firmware, hardware, etc [...]
APA, Harvard, Vancouver, ISO, and other styles
42

Bartoli, A., A. De Lorenzo, E. Medvet, M. Faraguna, and F. Tarlao. "A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration." Cybernetics and Information Technologies 18, no. 4 (November 1, 2018): 94–110. http://dx.doi.org/10.2478/cait-2018-0050.

Full text
Abstract:
Abstract Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential target for attacks. Many public administrations offer services on the web, thus we have entered a world in which web sites of public interest are continuously and systematically depending on web servers that may be located anywhere in the world and are potentially under control of other governments. In this work we focus on these issues by investigating the content included by almost 10000 web sites of the Italian Public Administration. We analyse the nature of such content, its quantity, its geographical location, the amount of dynamic variations over time. Our analyses demonstrate that the perimeter of trust of the Italian Public Administration collectively includes countries that are well beyond the control of the Italian government and provides several insights useful for implementing a centralized monitoring service aimed at detecting anomalies.
APA, Harvard, Vancouver, ISO, and other styles
43

Lubkin, I. A. "Application security metrics when using defense system against vulnerabilities based on return-oriented programming." Proceedings of Tomsk State University of Control Systems and Radioelectronics 24, no. 4 (2021): 46–51. http://dx.doi.org/10.21293/1818-0442-2021-24-4-46-51.

Full text
Abstract:
The vulnerabilities using return-oriented programming pose threats to the functioning of information systems. There are many protection systems to counteract them. They are based on various principles of functioning. At the same time, there are no generally accepted approaches to assess the security of applied solutions. The paper proposes security metrics that allow obtaining objective data on the efficiency of protection against RoP vulnerabilities. Proposed security metrics show ability to perform attack by gain control over control flow graph.
APA, Harvard, Vancouver, ISO, and other styles
44

Mankovskyi, D. "Leading morphological dominants of stroke as a basis for the morbid psychotype in cardiosurgical patients with postoperative hypoxic-ischemic injuries." Journal of Education, Health and Sport 11, no. 10 (October 29, 2021): 423–34. http://dx.doi.org/10.12775/jehs.2021.11.10.039.

Full text
Abstract:
The study of the structural dominants of stroke as a valid element of the evidence base of the morbid psychotype in cardiosurgical patients with postoperative hypoxic-ischemic injuries is currently a priority. It is mostly due to the actual issues of unresolved problems of patient-oriented strategy of neurological support of cardiosurgical patients, endless contradictions in the tactics of management of this category of patients, frequency and clinical polymorphism of postoperative complications (strokes, encephalopathies, dysfunction, neurosis etc.). Preoperative preparation of patients, transoperative management of patients; issues of premedication, anesthesia; prevention of complications and persistent disabilities, prognosis of efficiency and further quality of life, sometimes social psychoadaptation – all of this require specialists having a deep and comprehensive understanding of the leading components of the nosological prototype, the basic criteria of morphological patterns of the disease. Taking into account the latter, the role and the importance of morphological diagnosis of clinical manifestations is clearly growing among a fairly wide range of complications in cardiac surgery. Aim of research: was to investigate the leading morphological dominants of stroke as a basis for the morbid psychotype in cardiosurgery patients with postoperative hypoxic-ischemic injuries. Material and research methods. Morphological analysis (histological examination) was performed on pieces of brain (gray and white matter), 0.5 cubic cm in size of healthy individuals (infection control, IC, n = 12) and those who belonged to the group of clinical observation, CO, n = 18 (also including thanatological follow-up data from own retrospective annals and archives. The author of the work pays tribute to the bright memory of Professor, Doctor of Medical Sciences A. F. Yakovtsova – Honorary Professor of the Department of Pathological Anatomy, Kharkiv National Medical University, Ministry of Health of Ukraine – for professional consultations during the implementation of this fragment of the dissertation research). The sectional material was carefully removed, pieces with sections of cortical and cerebral matter were separated, and then washed in running water. Fixation was performed for at least 24 hours in 12% formalin solution on phosphate buffer (pH = 7.0-7.2), at t0 =18-200 Co in a glass-ceramic vessel. Dehydration of the material took place through a system of ethyl alcohols solutions from 300 to absolute, poured into resin (paraffin / celloidin according to the needs of the study). From the obtained blocks, using the resources of the microtome “MK-25”, we made a series of histological sections with a thickness of 5-10 μm (in one of three mutually perpendicular planes: frontal, horizontal, sagittal). The obtained sections were stained depending on the research tasks, its strategy, taking into account the type of tissue (hematoxylin-eosin, according to Van Gieson). Histological examination of gray and white matter of the brain was performed by stages. Microscopic analysis of the material was performed using a light optical system of the Lieca microscope (Germany) (x 100; x 300). The cortical and cerebral substances of the cerebral hemispheres and areas of the penumbra were examined. Comparison of control samples with the clinical version was carried out in a comparative aspect. Results. Morphological analysis of native brain preparations samples of healthy individuals, IC (cases of sudden death for the reasons unrelated to pathology of the central and peripheral nervous system) showed in favor of a complete correlation of structural and functional changes with sex-age parameters of postnatal ontogenesis. Gray and white substances are contrast, clearly differentiated, their layers are well marked, they did not contain any signs of foci of inflammation, destructive-degenerative processes, heart attacks and necrosis. The results of the study of the material, from persons belonging to the clinical observation group (ischemic stroke as one of the prototypes of hypoxic-ischemic complications in cardiosurgery patients), showed the presence of ischemic injuries. The latter were characterized by a phased nature, which to some extent depended on the timing of the onset of the stroke phenomenon, the depth of organic damage, microtopography, the volume of areas of destructive and degenerative changes. The foci of edema being inflammatory phenomena and the result of ischemia attracted the attention. The substance of the brain in these loci and adjacent areas is “softened”, brittle, flabby, in a state of dyschromatosis, it is not elastic enough. Some histological preparations observed in the near-term period contained areas of necrosis, with elements of generalizations of ischemic phenomena. Neighboring with damaged areas the fragments of the substance are saturated with leukocyte infiltrates, which are more contrast. Нeart attacks (morphologically thy are trivial focal necrosis) were the leading diagnostic features of ischemic genesis. Conclusion. The pathogenetic scenario of stroke has a number of phases. Its primary leading morphological dominants (as a component of the morbid psychotype of cardiosurgery patients with postoperative hypoxic-ischemic disorders) include the occurrence of focal cerebral infarctions (white, red, mixed). The latter by their nature are necrosis and are caused by ischemia, due to the development of vascular disorders (stasis, thrombosis), lack of blood supply / trophism of the relevant areas of the brain. The final stages of the morphological strategy of stroke are characterized by the appearance of foci of proliferation, astrocytes, collagen fibers, the formation of gliomesodermal, connective tissue scars, cysts.
APA, Harvard, Vancouver, ISO, and other styles
45

Felson, Richard B., and James T. Tedeschi. "A Social Interactionist Approach to Violence: Cross-cultural Applications." Violence and Victims 8, no. 3 (January 1993): 295–310. http://dx.doi.org/10.1891/0886-6708.8.3.295.

Full text
Abstract:
A “social interactionist approach” is applied to incidents of interpersonal violence in a variety of cultures. Violence, like other forms of coercion, is viewed as goal-oriented behavior, designed to produce compliance, restore retributive justice, and to assert and protect social identities. The approach emphasizes the role of grievances and social control, the escalation of coercive interactions when identities are attacked, and the role of third parties. It is suggested that the incentives for violence and other forms of coercion are similar in all cultures.
APA, Harvard, Vancouver, ISO, and other styles
46

Husam Mahdi, Miaad, and Ibrahim Adel Ibrahim. "Enhancing the security of quality of service-oriented distributed routing protocol for hybrid wireless network." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 1 (April 1, 2023): 121. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp121-128.

Full text
Abstract:
Merging the wireless infrastructure network with the wireless mobile ad-hoc networks constitutes hybrid wireless networks (HWNs). Quality of service (QoS) demands are available with the help of HWNs. However, these networks are subjected to many types of attacks because of their open wireless medium. To enhance the security of HWNs, it is necessary to provide secure routing protocols. Several routing protocols have been proposed for HWNs, one of them is the quality of service-oriented distributed (QOD) routing protocol. In this paper, two security mechanisms have been proposed for the QOD protocol. The first mechanism is used to protect transmitted data in the network using asymmetric and symmetric cryptography. The second mechanism has been proposed to enhance the security of the QOD routing protocol using keyed hash message authentication code (HMAC). The second security mechanism assumed that there is a secret key shared between each pair of neighbor nodes. Also, asymmetric cryptography is used to exchange the secret key. The secret key is used to include the message authentication code (MAC) for each message exchanged between the neighbor nodes. A network simulator NS2 is used to simulate our proposed schemes.
APA, Harvard, Vancouver, ISO, and other styles
47

Corke, Thomas C., Patrick O. Bowles, Chuan He, and Eric H. Matlis. "Sensing and control of flow separation using plasma actuators." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 369, no. 1940 (April 13, 2011): 1459–75. http://dx.doi.org/10.1098/rsta.2010.0356.

Full text
Abstract:
Single dielectric barrier discharge plasma actuators have been used to control flow separation in a large number of applications. An often used configuration involves spanwise-oriented asymmetric electrodes that are arranged to induce a tangential wall jet in the mean flow direction. For the best effect, the plasma actuator is placed just upstream of where the flow separation will occur. This approach is generally more effective when the plasma actuator is periodically pulsed at a frequency that scales with the streamwise length of the separation zone and the free-stream velocity. The optimum frequency produces two coherent spanwise vortices within the separation zone. It has been recently shown that this periodic pulsing of the plasma actuator could be sensed by a surface pressure sensor only when the boundary layer was about to separate, and therefore could provide a flow separation indicator that could be used for feedback control. The paper demonstrates this approach on an aerofoil that is slowly increasing its angle of attack, and on a sinusoidally pitching aerofoil undergoing dynamic stall. Short-time spectral analysis of time series from a static pressure sensor on the aerofoil is used to determine the separation state that ranges from attached, to imminent separation, to fully separated. A feedback control approach is then proposed, and demonstrated on the aerofoil with the slow angle of attack motion.
APA, Harvard, Vancouver, ISO, and other styles
48

Poddubnyi, V. O., R. Y. Gvozdov, О. V. Sievierinov, and V. M. Fedorchenko. "Object-oriented model of a formal description of an information and communication system." Radiotekhnika, no. 209 (June 24, 2022): 110–17. http://dx.doi.org/10.30837/rt.2022.2.209.11.

Full text
Abstract:
The purpose of the article is to study algorithms for the formal description of information and communication systems. The article discusses the main provisions on the formal representation of objects of information and communication systems. It is noted that the main environments of the information and communication system that are subject to a formal description are: physical environment, computing system environment, user environment, information environment. These components of the information and communication system are considered in detail, analyzed and documented in an informal form (in the form of text). There is a need for a mechanism for a unified description of a system that includes all environments. Such a description will be unambiguously formalized with well-defined mathematical concepts. The mechanism of a single formal description or the technique of a formal description will be unambiguous in understanding and serve as a control description when developing an information security policy in an information and communication system. An algorithm for the formal description of the information and communication system is proposed. In this algorithm, it is proposed to focus on the types and interaction of objects with each other. In such a scheme, attention is focused on such concepts as the object, the characteristics of the object, and the type of interaction with the object. Further consideration of the created block diagrams (graphs) is proposed to explore the possibilities of using this model to simulate cyber-attacks. Since each element contains fields that connect it to other elements, and each attack has an "entry point" using graph theory, it is possible to traverse the graph to determine the possible horizontal propagation paths of a cyber-attack.
APA, Harvard, Vancouver, ISO, and other styles
49

Wan, Kaifang, Dingwei Wu, Yiwei Zhai, Bo Li, Xiaoguang Gao, and Zijian Hu. "An Improved Approach towards Multi-Agent Pursuit–Evasion Game Decision-Making Using Deep Reinforcement Learning." Entropy 23, no. 11 (October 29, 2021): 1433. http://dx.doi.org/10.3390/e23111433.

Full text
Abstract:
A pursuit–evasion game is a classical maneuver confrontation problem in the multi-agent systems (MASs) domain. An online decision technique based on deep reinforcement learning (DRL) was developed in this paper to address the problem of environment sensing and decision-making in pursuit–evasion games. A control-oriented framework developed from the DRL-based multi-agent deep deterministic policy gradient (MADDPG) algorithm was built to implement multi-agent cooperative decision-making to overcome the limitation of the tedious state variables required for the traditionally complicated modeling process. To address the effects of errors between a model and a real scenario, this paper introduces adversarial disturbances. It also proposes a novel adversarial attack trick and adversarial learning MADDPG (A2-MADDPG) algorithm. By introducing an adversarial attack trick for the agents themselves, uncertainties of the real world are modeled, thereby optimizing robust training. During the training process, adversarial learning was incorporated into our algorithm to preprocess the actions of multiple agents, which enabled them to properly respond to uncertain dynamic changes in MASs. Experimental results verified that the proposed approach provides superior performance and effectiveness for pursuers and evaders, and both can learn the corresponding confrontational strategy during training.
APA, Harvard, Vancouver, ISO, and other styles
50

Jones, J. G., G. D. Padfield, and M. T. Charlton. "Wavelet analysis of pilot workload in helicopter low-level flying tasks." Aeronautical Journal 103, no. 1019 (January 1999): 55–63. http://dx.doi.org/10.1017/s0001924000065106.

Full text
Abstract:
Abstract As part of a programme of research to improve mission effectiveness by studying pilot workload and task performance in mission-oriented flight tasks, a methodology has been developed in which wavelet analysis is used to extract information from records of vehicle response and of pilot control activity. By decomposing the records into discrete wavelets, components of vehicle agility and pilot workload are derived in the form of wavelet-based ‘quickness’ parameters for vehicle agility and so-called ‘attack’ parameters for pilot workload. It is shown how individual wavelet components in the records of pilot control activity, referred to as ‘worklets', can be associated with the sub-tasks of ‘guidance’ and ‘stabilisation'. It is demonstrated how these concepts can be applied to quantify changes in pilot control activity associated with increasing task difficulty or changes in aircraft handling qualities. Two examples are presented, one from a flight trial in which the task difficulty was increased by changes in a prescribed ground track and the other from a simulation trial in which an increased time delay was introduced into the response of the flight control system.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography