Search results for: pilot contamination attacks
2075 Addressing Microbial Contamination in East Hararghe, Oromia, Ethiopia: Improving Water Sanitation Infrastructure and Promoting Safe Water Practices for Enhanced Food Safety
Authors: Tuji Jemal Ahmed, Hussen Beker Yusuf
Abstract:
Food safety is a major concern worldwide, with microbial contamination being one of the leading causes of foodborne illnesses. In Ethiopia, drinking water and untreated groundwater are a primary source of microbial contamination, leading to significant health risks. East Hararghe, Oromia, is one of the regions in Ethiopia that has been affected by this problem. This paper provides an overview of the impact of untreated groundwater on human health in Haramaya Rural District, East Hararghe and highlights the urgent need for sustained efforts to address the water sanitation supply problem. The use of untreated groundwater for drinking and household purposes in Haramaya Rural District, East Hararghe is prevalent, leading to high rates of waterborne illnesses such as diarrhea, typhoid fever, and cholera. The impact of these illnesses on human health is significant, resulting in significant morbidity and mortality, especially among vulnerable populations such as children and the elderly. In addition to the direct health impacts, waterborne illnesses also have indirect impacts on human health, such as reduced productivity and increased healthcare costs. Groundwater sources are susceptible to microbial contamination due to the infiltration of surface water, human and animal waste, and agricultural runoff. In Haramaya Rural District, East Hararghe, poor water management practices, inadequate sanitation facilities, and limited access to clean water sources contribute to the prevalence of untreated groundwater as a primary source of drinking water. These underlying causes of microbial contamination highlight the need for improved water sanitation infrastructure, including better access to safe drinking water sources and the implementation of effective treatment methods. The paper emphasizes the need for regular water quality monitoring, especially for untreated groundwater sources, to ensure safe drinking water for the population. The implementation of effective preventive measures, such as the use of effective disinfectants, proper waste disposal methods, and regular water quality monitoring, is crucial to reducing the risk of contamination and improving public health outcomes in the region. Community education and awareness-raising campaigns can also play a critical role in promoting safe water practices and reducing the risk of contamination. These campaigns can include educating the population on the importance of boiling water before drinking, the use of water filters, and proper sanitation practices. In conclusion, the use of untreated groundwater as a primary source of drinking water in East Hararghe, Oromia, Ethiopia, has significant impacts on human health, leading to widespread waterborne illnesses and posing a significant threat to public health. Sustained efforts are urgently needed to address the root causes of contamination, such as poor sanitation and hygiene practices, improper waste management, and the water sanitation supply problem, including the implementation of effective preventive measures and community-based education programs, ultimately improving public health outcomes in the region. A comprehensive approach that involves community-based water management systems, point-of-use water treatment methods, and awareness-raising campaigns can contribute to reducing the incidence of microbial contamination in the region.Keywords: food safety, health risks, microbial contamination, untreated groundwater
Procedia PDF Downloads 1122074 Pilot Directional Protection Scheme Using Wireless Communication
Authors: Nitish Sharma, G. G. Karady
Abstract:
This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today’s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays.Keywords: smart grid protection, pilot protection, power system simulation, wireless communication
Procedia PDF Downloads 6352073 Investigation of the Effect of Pressure Changes on the Gas Proportional Detector
Authors: S. M. Golgoun, S. M. Taheri
Abstract:
Investigation of radioactive contamination of personnel working in radiation centers to identify radioactive materials and then measure the potential contamination and eliminate it has always been considered. For this purpose, various ways have been proposed so far and different devices have been designed and built. Gas sealed proportional counter has special working conditions. In this research, a gas sealed detector of proportional counter type was made and then its various parameters were investigated. Some parameters are influential on their working conditions and one of these most important parameters is the internal pressure of the proportional gas-filled detector. In this experimental research, we produced software for examination and altering high voltage, registering data, and calculating efficiency. By this, we investigated different gas pressure effects on detector efficiency and proposed optimizing working conditions of this detector. After reviewing the results, we suggested a range between 20-30 mbar pressure for this gas sealed detector.Keywords: gas sealed, proportional detector, pressure, counter
Procedia PDF Downloads 1172072 Potential of Ozonation and Phytoremediation to Reduce Hydrocarbon Levels Remaining after the Pilot Scale Microbial Based Bioremediation (Land-Farming) of a Heavily Polluted Soil
Authors: Hakima Althalb
Abstract:
Petroleum contamination of sandy soils is a severe environmental problem in Libya, but relatively little work has been carried out to optimize the bioremediation of such heavily contaminated soil, particularly at a pilot scale. The purpose of this research was to determine the potential for the microbial-based bioremediation of hydrocarbon-contaminated soil obtained from an oil refinery in Libya and to assess the potential of both ozonation and phytoremediation (both applied after initial bioremediation) to reduce residual hydrocarbon levels. Plots containing 500 kg soil (triplicates) (contaminated soil diluted with clean soil 50% volume) were set up, (designated as Land Treatment Units; LTUs) containing five different nutrient levels and mixtures (Urea + NPK (nitrogen; phosphor; potassium) mixtures) to obtain C:N:P ratios 100:10:1, and monitored for 90 days. Hydrocarbon levels, microbial numbers, and toxicity (EC50 using luminescent microbial based tests) were assessed. Hydrocarbon levels in non-diluted and diluted soil ranged from 20 733-22 366 mg/kg and from 16 000-17 000 mg/kg respectively. Although all the land treatment units revealed a significant hydrocarbon reduction over time, the highest reduction in hydrocarbon levels obtained was around 60%. For example, 63% hydrocarbon removal was observed using a mixture of urea and NPK with a C:N:P ratio of 100:10:1). Soil toxicity (as assessed using luminescence based toxicity assays) reduced in line with the reduction in total petroleum hydrocarbons observed. However, as relatively high residual TPH (total petroleum hydrocarbon) levels (ranging from 6033-14166mg/kg) were still present after initial bioremediation two ‘post-treatments’ (phytoremediation and ozonation) were attempted to remove residual hydrocarbons remaining. Five locally grown (agriculturally important) plant species were tested. The germination of all plants examined was strongly inhibited (80-100%) and seedlings failed to grow well in the contaminated soil, indicating that the previously bioremediated soils were still toxic to the plants. Subsequent ozonation followed by another bioremediation of soil was more successful than phytoremediation. But even the most promising successful treatment in this study (ozonation for 6 hours at 25ppm followed by bioremediation) still only removed approximately 31% of the residual hydrocarbons. Overall, this work showed that the bioremediation of such highly contaminated soils is difficult and that a combination of treatments would be required to achieve successful remediation. Even after initial dilution and bioremediation the soils remained toxic to plant growth and were therefore not suitable for phytoremediation.Keywords: bioremediation, petroleum hydrocarbons, ozone, phytoremediation
Procedia PDF Downloads 1812071 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 1532070 Screening Ecological Risk Assessment at an Old Abandoned Mine in Northern Taiwan
Authors: Hui-Chen Tsai, Chien-Jen Ho, Bo-Wei Power Liang, Ying Shen, Yi-Hsin Lai
Abstract:
Former Taiwan Metal Mining Corporation and its associated 3 wasted flue gas tunnels, hereinafter referred to as 'TMMC', was contaminated with heavy metals, Polychlorinated biphenyls (PCBs) and Total Petroleum Hydrocarbons (TPHs) in soil. Since the contamination had been exposed and unmanaged in the environment for more than 40 years, the extent of the contamination area is estimated to be more than 25 acres. Additionally, TMMC is located in a remote, mountainous area where almost no residents are residing in the 1-km radius area. Thus, it was deemed necessary to conduct an ecological risk assessment in order to evaluate the details of future contaminated site management plan. According to the winter and summer, ecological investigation results, one type of endangered, multiple vulnerable and near threaten plant was discovered, as well as numerous other protected species, such as Crested Serpent Eagle, Crested Goshawk, Black Kite, Brown Shrike, Taiwan Blue Magpie were observed. Ecological soil screening level (Eco-SSLs) developed by USEPA was adopted as a reference to conduct screening assessment. Since all the protected species observed surrounding TMMC site were birds, screening ecological risk assessment was conducted on birds only. The assessment was assessed mainly based on the chemical evaluation, which the contamination in different environmental media was compared directly with the ecological impact levels (EIL) of each evaluation endpoints and the respective hazard quotient (HQ) and hazard index (HI) could be obtained. The preliminary ecological risk assessment results indicated HI is greater than 1. In other words, the biological stressors (birds) were exposed to the contamination, which was already exceeded the dosage that could cause unacceptable impacts to the ecological system. This result was mainly due to the high concentration of arsenic, metal and lead; thus it was suggested the above mention contaminants should be remediated as soon as possible or proper risk management measures should be taken.Keywords: screening, ecological risk assessment, ecological impact levels, risk management
Procedia PDF Downloads 1342069 The Effects of Molecular and Climatic Variability on the Occurrence of Aspergillus Species and Aflatoxin Production in Commercial Maize from Different Agro-climatic Regions in South Africa
Authors: Nji Queenta Ngum, Mwanza Mulunda
Abstract:
Introduction Most African research reports on the frequent aflatoxin contamination of various foodstuffs, with researchers rarely specifying which of the Aspergillus species are present in these commodities. Numerous research works provide evidence of the ability of fungi to grow, thrive, and interact with other crop species and focus on the fact that these processes are largely affected by climatic variables. South Africa is a water-stressed country with high spatio-temporal rainfall variability; moreover, temperatures have been projected to rise at a rate twice the global rate. This weather pattern change may lead to crop stress encouraging mold contamination with subsequent mycotoxin production. In this study, the biodiversity and distribution of Aspergillus species with their corresponding toxins in maize from six distinct maize producing regions with different weather patterns in South Africa were investigated. Materials And Methods By applying cultural and molecular methods, a total of 1028 maize samples from six distinct agro-climatic regions were examined for contamination by the Aspergillus species while the high performance liquid chromatography (HPLC) method was applied to analyse the level of contamination by aflatoxins. Results About 30% of the overall maize samples were contaminated by at least one Aspergillus species. Less than 30% (28.95%) of the 228 isolates subjected to the aflatoxigenic test was found to possess at least one of the aflatoxin biosynthetic genes. Furthermore, almost 20% were found to be contaminated with aflatoxins, with mean total aflatoxin concentration levels of 64.17 ppb. Amongst the contaminated samples, 59.02% had mean total aflatoxin concentration levels above the SA regulatory limit of 20ppb for animals and 10 for human consumption. Conclusion In this study, climate variables (rainfall reduction) were found to significantly (p<0.001) influence the occurrence of the Aspergillus species (especially Aspergillus fumigatus) and the production of aflatoxin in South Africa commercial maize by maize variety, year of cultivation as well as the agro-climatic region in which the maize is cultivated. This included, amongst others, a reduction in the average annual rainfall of the preceding year to about 21.27 mm, and, as opposed to other regions whose average maximum rainfall ranged between 37.24 – 44.1 mm, resulted in a significant increase in the aflatoxin contamination of maize.Keywords: aspergillus species, aflatoxins, diversity, drought, food safety, HPLC and PCR techniques
Procedia PDF Downloads 732068 DWT-SATS Based Detection of Image Region Cloning
Authors: Michael Zimba
Abstract:
A duplicated image region may be subjected to a number of attacks such as noise addition, compression, reflection, rotation, and scaling with the intention of either merely mating it to its targeted neighborhood or preventing its detection. In this paper, we present an effective and robust method of detecting duplicated regions inclusive of those affected by the various attacks. In order to reduce the dimension of the image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of a suspicious image. However, unlike most existing copy move image forgery (CMIF) detection algorithms operating in the DWT domain which extract only the low frequency sub-band of the DWT of the suspicious image thereby leaving valuable information in the other three sub-bands, the proposed algorithm simultaneously extracts features from all the four sub-bands. The extracted features are not only more accurate representation of image regions but also robust to additive noise, JPEG compression, and affine transformation. Furthermore, principal component analysis-eigenvalue decomposition, PCA-EVD, is applied to reduce the dimension of the features. The extracted features are then sorted using the more computationally efficient Radix Sort algorithm. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. The proposed algorithm is not only fast but also more robust to attacks compared to the related CMIF detection algorithms. The experimental results show high detection rates.Keywords: affine transformation, discrete wavelet transform, radix sort, SATS
Procedia PDF Downloads 2272067 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 2132066 Awareness for Air Pollution Impacts on Lung Cancer in Southern California: A Pilot Study for Designed Smartphone Application
Authors: M. Mohammed Raoof, A. Enkhtaivan, H. Aljuaid
Abstract:
This study follows the design science research methodology to design and implement a smartphone application artifact. The developed artifact was evaluated through three phases. The System Usability Scale (SUS) metric was used for the evaluation. The designed artifact aims to spread awareness about reducing air pollution, decreasing lung cancer development, and checking the air quality status in Southern California Counties. Participants have been drawn for a pilot study to facilitate awareness of air pollution. The study found that smartphone applications have a beneficial effect on the study’s aims.Keywords: air pollution, design science research, indoor air pollution, lung cancer, outdoor air pollution, smartphone application
Procedia PDF Downloads 1162065 Two-Level Graph Causality to Detect and Predict Random Cyber-Attacks
Authors: Van Trieu, Shouhuai Xu, Yusheng Feng
Abstract:
Tracking attack trajectories can be difficult, with limited information about the nature of the attack. Even more difficult as attack information is collected by Intrusion Detection Systems (IDSs) due to the current IDSs having some limitations in identifying malicious and anomalous traffic. Moreover, IDSs only point out the suspicious events but do not show how the events relate to each other or which event possibly cause the other event to happen. Because of this, it is important to investigate new methods capable of performing the tracking of attack trajectories task quickly with less attack information and dependency on IDSs, in order to prioritize actions during incident responses. This paper proposes a two-level graph causality framework for tracking attack trajectories in internet networks by leveraging observable malicious behaviors to detect what is the most probable attack events that can cause another event to occur in the system. Technically, given the time series of malicious events, the framework extracts events with useful features, such as attack time and port number, to apply to the conditional independent tests to detect the relationship between attack events. Using the academic datasets collected by IDSs, experimental results show that the framework can quickly detect the causal pairs that offer meaningful insights into the nature of the internet network, given only reasonable restrictions on network size and structure. Without the framework’s guidance, these insights would not be able to discover by the existing tools, such as IDSs. It would cost expert human analysts a significant time if possible. The computational results from the proposed two-level graph network model reveal the obvious pattern and trends. In fact, more than 85% of causal pairs have the average time difference between the causal and effect events in both computed and observed data within 5 minutes. This result can be used as a preventive measure against future attacks. Although the forecast may be short, from 0.24 seconds to 5 minutes, it is long enough to be used to design a prevention protocol to block those attacks.Keywords: causality, multilevel graph, cyber-attacks, prediction
Procedia PDF Downloads 1562064 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2682063 Prevalence, Antimicrobial Susceptibility Pattern and Associated Risk Factors for Salmonella Species and Escherichia coli from Raw Meat at Butchery Houses in Mekelle, Tigray, Ethiopia
Authors: Haftay Abraha Tadesse, Atsebaha Gebrekidan Kahsay, Mahumd Abdulkader
Abstract:
Background: Salmonella species and Escherichia coli are important foodborne pathogens affecting humans and animals. They are among the most important causes of infection that are associated with the consumption of contaminated food. This study was aimed to determine the prevalence, antimicrobial susceptibility patterns and associated risk factors for Salmonella species and E. coli in raw meat from butchery houses of Mekelle, Northern Ethiopia. Methodology: A cross-sectional study was conducted from January to September 2019. Socio-demographic data and risk factors were collected using a predesigned questionnaire. Meat samples were collected aseptically from the butchery houses and transported using icebox to Mekelle University, College of Veterinary Sciences for the isolation and identification of Salmonella species and E. coli, Antimicrobial susceptibility patterns were determined using Kirby disc diffusion method. Data obtained were cleaned and entered into Statistical Package for the Social Sciences version 22 and logistic regression models with odds ratio were calculated. P-value < 0.05 was considered as statistically significant. Results: A total of 153 out of 384 (39.8%) of the meat specimens were found to be contaminated. The contamination of Salmonella species and E. coli were 15.6% (n=60) and 20.8%) (n=80), respectively. Mixed contamination (Salmonella species and E. coli) was observed in 13 (3.4 %) of the analyzed. Poor washing hands regularly (AOR = 8.37; 95% CI: 2.75-25.50) and not using gloves during meat handling (AOR=11. 28; 95% CI: (4.69 27.10) were associated with an overall bacterial contamination.About 95.5% of the tested isolates were sensitive to chloramphenicol and norfloxacin while the resistance of amoxyclav_amoxicillin and erythromycin were both isolated bacteria species. The overall multidrug resistance pattern for Salmonella and E. coli were 51.4% (n=19) and 31.8% (14), respectively. Conclusion: Of the 153 (153/384) contaminated raw meat, 60 (15.6%) and 80 (20.8%) were contaminated by Salmonella species and E. coli, respectively. Poor hand washing practice and not using glove during meat handling showed significant association with bacterial contamination. Multidrug-resistant showed in Salmonella species and E. coli were 19 (51.4%) and 14 (31.8%), respectively.Keywords: antimicrobial susceptibility test, butchery houses, e. coli, salmonella species
Procedia PDF Downloads 512062 Health Burden of Disease Assessment for Minimizing Aflatoxin Exposure in Peanuts
Authors: Min-Pei Ling
Abstract:
Aflatoxin is a fungal secondary metabolite with high toxicity capable of contaminating various types of food crops. It has been identified as a Group 1 human carcinogen by the International Agency for Research on Cancer. Chronic aflatoxin exposure has caused a worldwide public food safety concern. Peanuts and peanut products are the major sources of aflatoxin exposure. Therefore, some reduction interventions have been developed to minimize contamination through the peanut production chain. The purpose of this study is to estimate the efficacy of interventions in reducing the health impact of hepatocellular carcinoma caused by aflatoxin contamination in peanuts. The estimated total disability-adjusted life-years (DALYs) was calculated using FDA-iRISK online software. Six aflatoxin reduction strategies were evaluated, including good agricultural practice (GAP), biocontrol, Purdue Improved Crop Storage packaging, basic processing, ozonolysis, and ultraviolet irradiation. The results indicated that basic processing could prevent huge public health loss of 4,079.7–21,833 total DALYs per year, which accounted for 39.6% of all decreased total DALYs. GAP and biocontrol were both effective strategies in the farm field, while the other three interventions were limited in reducing total DALYs. In conclusion, this study could help farmers, processing plants, and government policymakers to alleviate aflatoxin contamination issues in the peanut production chain.Keywords: aflatoxin, health burden, disability-adjusted life-years, peanuts
Procedia PDF Downloads 1332061 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 812060 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 552059 Evaluation of Groundwater Quality and Contamination Sources Using Geostatistical Methods and GIS in Miryang City, Korea
Authors: H. E. Elzain, S. Y. Chung, V. Senapathi, Kye-Hun Park
Abstract:
Groundwater is considered a significant source for drinking and irrigation purposes in Miryang city, and it is attributed to a limited number of a surface water reservoirs and high seasonal variations in precipitation. Population growth in addition to the expansion of agricultural land uses and industrial development may affect the quality and management of groundwater. This research utilized multidisciplinary approaches of geostatistics such as multivariate statistics, factor analysis, cluster analysis and kriging technique in order to identify the hydrogeochemical process and characterizing the control factors of the groundwater geochemistry distribution for developing risk maps, exploiting data obtained from chemical investigation of groundwater samples under the area of study. A total of 79 samples have been collected and analyzed using atomic absorption spectrometer (AAS) for major and trace elements. Chemical maps using 2-D spatial Geographic Information System (GIS) of groundwater provided a powerful tool for detecting the possible potential sites of groundwater that involve the threat of contamination. GIS computer based map exhibited that the higher rate of contamination observed in the central and southern area with relatively less extent in the northern and southwestern parts. It could be attributed to the effect of irrigation, residual saline water, municipal sewage and livestock wastes. At wells elevation over than 85m, the scatter diagram represents that the groundwater of the research area was mainly influenced by saline water and NO3. Level of pH measurement revealed low acidic condition due to dissolved atmospheric CO2 in the soil, while the saline water had a major impact on the higher values of TDS and EC. Based on the cluster analysis results, the groundwater has been categorized into three group includes the CaHCO3 type of the fresh water, NaHCO3 type slightly influenced by sea water and Ca-Cl, Na-Cl types which are heavily affected by saline water. The most predominant water type was CaHCO3 in the study area. Contamination sources and chemical characteristics were identified from factor analysis interrelationship and cluster analysis. The chemical elements that belong to factor 1 analysis were related to the effect of sea water while the elements of factor 2 associated with agricultural fertilizers. The degree level, distribution, and location of groundwater contamination have been generated by using Kriging methods. Thus, geostatistics model provided more accurate results for identifying the source of contamination and evaluating the groundwater quality. GIS was also a creative tool to visualize and analyze the issues affecting water quality in the Miryang city.Keywords: groundwater characteristics, GIS chemical maps, factor analysis, cluster analysis, Kriging techniques
Procedia PDF Downloads 1672058 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things
Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane
Abstract:
In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm
Procedia PDF Downloads 2102057 Residue and Ecological Risk Assessment of Polybrominated Diphenyl Ethers (PBDEs) in Sediment from CauBay River, Vietnam
Authors: Toan Vu Duc, Son Ha Viet
Abstract:
This research presents the first comprehensive survey of congener profiles (7 indicator congeners) of polybrominated diphenyl ethers (PBDEs) in sediment samples covering ten sites in CauBay River, Vietnam. Chemical analyses were carried out in gas chromatography–mass spectrometry (GC–MS) for tri- to hepta- brominated congeners. Results pointed out a non-homogenous contamination of the sediment with ∑7 PBDE values ranging from 8.93 to 25.64ng g−1, reflecting moderate to low contamination closely in conformity to other Asian aquatic environments. The general order of decreasing congener contribution to the total load was: BDE 47 > 99 > 100 > 154, similar to the distribution pattern worldwide. PBDEs had rare risks in the sediment of studied area. However, due to the propensity of PBDEs to accumulate in various compartments of wildlife and human food webs, evaluation of biological tissues should be undertaken as a high priority.Keywords: residue, risk assessment, PBDEs, sediment
Procedia PDF Downloads 2952056 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN
Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu
Abstract:
Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.Keywords: DDoS detection, EMD, relative entropy, SDN
Procedia PDF Downloads 3362055 Assessment of Trace Metals Contamination in Surficial and Core Sediments from Ghannouch- Gabes Coastline, Impact of Phosphogypsum Discharge, Southeastern of Tunisia, Mediterranean Sea: Geochemical and Mineralogical Approaches
Authors: Rim Ben Amor, Myriam Abidi, Moncef Gueddari
Abstract:
The purpose of the present study is to assess the level and the distribution of CaO, SO3, Cd, Cu, Pb and Zn incore sediments of Ghannouch-Gabes coast, Gulf of Gabes, Tunisian Mediterranean coast. The XRD analyses indicate that the sediments of Ghannouch-Gabes coast are mainly composed of quartz, calcite, gypsum and fluorine reflecting the impact of the phosphate fertilizer industrial waste. The vertical distribution of surface sediments shows for all the elements analyzed, that the area located between the commercial and the fishing port of Gabes, is the most polluted zone, where the two harbors acted as barriers and limited the dispersion of phosphogypsum discharge. The abundance order of metals was found to be Zn > Cd > Cu >Pb and that the highest levels of heavy metals were found in the uppermost segment of the sediment core compared to lower depth subsurface due to a continuous input of PG release and showed that the area between the two harbor suffered from several types of pollutants compared to reference core C1, collected from non-industrialized area. The level of pollution was evaluated using contamination factor (Cf), pollution load index (PLI) and the geoaccumulation index (Igeo). The obtained results of Igeo allowed us to distinguish that the area between the commercial harbor of Ghannouch and the fishing harbor of Gabes is the most polluted where sediments are strongly contaminated for Pb, Cu and Cd. The pollution load index (PLI) of all sediments collected classified them as "polluted". According to contamination factor (Cf), the sediments can be considered as ‘considerable’ to ‘very high’ contaminated for Pb, ‘very high to moderate’ for Cd, ‘ moderate’ for Zn, between ‘moderate’ and ‘considerable’ for Cu. Statistical analyses show that heavy metals, fluoride, calcium and sulphate are resulting from the same anthropogenic origin. The metallic pollution status of sediments of Ghanouch -Gabes coast is worrying and requires a serious intervention.Keywords: trace metals, phosphogypsum, core sediments, accumulation factor, contamination factor
Procedia PDF Downloads 1402054 Constructing a Semi-Supervised Model for Network Intrusion Detection
Authors: Tigabu Dagne Akal
Abstract:
While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.Keywords: intrusion detection, data mining, computer science, data mining
Procedia PDF Downloads 2942053 Consequential Effects of Coal Utilization on Urban Water Supply Sources – a Study of Ajali River in Enugu State Nigeria
Authors: Enebe Christian Chukwudi
Abstract:
Water bodies around the world notably underground water, ground water, rivers, streams, and seas, face degradation of their water quality as a result of activities associated with coal utilization including coal mining, coal processing, coal burning, waste storage and thermal pollution from coal plants which tend to contaminate these water bodies. This contamination results from heavy metals, presence of sulphate and iron, dissolved solids, mercury and other toxins contained in coal ash, sludge, and coal waste. These wastes sometimes find their way to sources of urban water supply and contaminate them. A major problem encountered in the supply of potable water to Enugu municipality is the contamination of Ajali River, the source of water supply to Enugu municipal by coal waste. Hydro geochemical analysis of Ajali water samples indicate high sulphate and iron content, high total dissolved solids(TDS), low pH (acidity values) and significant hardness in addition to presence of heavy metals, mercury, and other toxins. This is indicative of the following remedial measures: I. Proper disposal of mine wastes at designated disposal sites that are suitably prepared. II. Proper water treatment and III. Reduction of coal related contaminants taking advantage of clean coal technology.Keywords: effects, coal, utilization, water quality, sources, waste, contamination, treatment
Procedia PDF Downloads 4212052 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 3062051 Multivariate Statistical Analysis of Heavy Metals Pollution of Dietary Vegetables in Swabi, Khyber Pakhtunkhwa, Pakistan
Authors: Fawad Ali
Abstract:
Toxic heavy metal contamination has a negative impact on soil quality which ultimately pollutes the agriculture system. In the current work, we analyzed uptake of various heavy metals by dietary vegetables grown in wastewater irrigated areas of Swabi city. The samples of soil and vegetables were analyzed for heavy metals viz Cd, Cr, Mn, Fe, Ni, Cu, Zn and Pb using Atomic Absorption Spectrophotometer. High levels of metals were found in wastewater irrigated soil and vegetables in the study area. Especially the concentrations of Pb and Cd in the dietary vegetable crossed the permissible level of World Health Organization. Substantial positive correlation was found among the soil and vegetable contamination. Transfer factor for some metals including Cr, Zn, Mn, Ni, Cd and Cu was greater than 0.5 which shows enhanced accumulation of these metals due to contamination by domestic discharges and industrial effluents. Linear regression analysis indicated significant correlation of heavy metals viz Pb, Cr, Cd, Ni, Zn, Cu, Fe and Mn in vegetables with concentration in soil of 0.964 at P≤0.001. Abelmoschus esculentus indicated Health Risk Index (HRI) of Pb >1 in adults and children. The source identification analysis carried out by Principal Component Analysis (PCA) and Cluster Analysis (CA) showed that ground water and soil were being polluted by the trace metals coming out from industries and domestic wastes. Hierarchical cluster analysis (HCA) divided metals into two clusters for wastewater and soil but into five clusters for soil of control area. PCA extracted two factors for wastewater, each contributing 61.086 % and 16.229 % of the total 77.315 % variance. PCA extracted two factors, for soil samples, having total variance of 79.912 % factor 1 and factor 2 contributed 63.889 % and 16.023 % of the total variance. PCA for sub soil extracted two factors with a total variance of 76.136 % factor 1 being 61.768 % and factor 2 being 14.368 %of the total variance. High pollution load index for vegetables in the study area due to metal polluted soil has opened a study area for proper legislation to protect further contamination of vegetables. This work would further reveal serious health risks to human population of the study area.Keywords: health risk, vegetables, wastewater, atomic absorption sepctrophotometer
Procedia PDF Downloads 692050 Modelling Interactions between Saturated and Unsaturated Zones by Hydrus 1D, Plain of Kairouan, Central Tunisia
Authors: Mariem Saadi, Sabri Kanzari, Adel Zghibi
Abstract:
In semi-arid areas like the Kairouan region, the constant irrigation with saline water and the overuse of groundwater resources, soils and aquifers salinization has become an increasing concern. In this study, a methodology has been developed to evaluate the groundwater contamination risk based on the unsaturated zone hydraulic properties. Two soil profiles with different ranges of salinity, one located in the north of the plain and another one in the south of plain (each 30 m deep) and both characterized by direct recharge of the aquifer were chosen. Simulations were conducted with Hydrus-1D code using measured precipitation data for the period 1998-2003 and calculated evapotranspiration for both chosen profiles. Four combinations of initial conditions of water content and salt concentration were used for the simulation process in order to find the best match between simulated and measured values. The success of the calibration of Hydrus-1D allowed the investigation of some scenarios in order to assess the contamination risk under different natural conditions. The aquifer risk contamination is related to the natural conditions where it increased while facing climate change and temperature increase and decreased in the presence of a clay layer in the unsaturated zone. Hydrus-1D was a useful tool to predict the groundwater level and quality in the case of a direct recharge and in the absence of any information related to the soil layers except for the texture.Keywords: Hydrus-1D, Kairouan, salinization, semi-arid region, solute transport, unsaturated zone
Procedia PDF Downloads 1802049 Attack Redirection and Detection using Honeypots
Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat
Abstract:
A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner
Procedia PDF Downloads 1542048 Evaluation of the Effectiveness of Barriers for the Control of Rats in Rice Plantation Field
Authors: Melina, Jumardi Jumardi, Erwin Erwin, Sri Nuraminah, Andi Nasruddin
Abstract:
The rice field rat (Rattus argentiventer Robinson and Kloss) is a pest causing the greatest yield loss of rice plants, especially in lowland agroecosystems with intensive cropping patterns (2-3 plantings per year). Field mice damage rice plants at all stages of growth, from seedling to harvest, even in storage warehouses. Severe damage with yield loss of up to 100% occurs if rats attack rice at the generative stage because the plants are no longer able to recover by forming new tillers. Farmers mainly use rodenticides in the form of poisoned baits or as fumigants, which are applied to rat burrow holes. This practice is generally less effective because mice are able to avoid the poison or become resistant after several exposures to it. In addition, excessive use of rodenticides can have negative impacts on the environment and non-target organisms. For this reason, this research was conducted to evaluate the effectiveness of fences as an environmentally friendly mechanical control method in reducing rice yield losses due to rat attacks. This study used a factorial randomized block design. The first factor was the fence material, namely galvanized zinc plate and plastic. The second factor was the height of the fence, namely 25, 50, 75, and 100 cm from the ground level. Each treatment combination was repeated five times. Data shows that zinc fences with a height of 75 and 100 cm are able to provide full protection to plants from rat infestations throughout the planting season. However, zinc fences with a height of 25 and 50 cm failed to prevent rat attacks. Plastic fences with a height of 25 and 50 cm failed to prevent rat attacks during the planting season, whereas 75 and 100 cm were able to prevent rat attacks until all the crops outside of the fence had been eaten by rats. The rat managed to get into the fence by biting the plastic fence close to the ground. Thus, the research results show that fences made of zinc plate with a height of at least 75 cm from the ground surface are effective in preventing plant damage caused by rats. To our knowledge, this research is the first to quantify the effectiveness of fences as a control of field rodents.Keywords: rice field rat, Rattus argentiventer, fence, rice
Procedia PDF Downloads 392047 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union
Authors: María Elena Menéndez Ibáñez
Abstract:
After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.Keywords: border control, immigration, international cooperation, national security
Procedia PDF Downloads 1372046 Multiperson Drone Control with Seamless Pilot Switching Using Onboard Camera and Openpose Real-Time Keypoint Detection
Authors: Evan Lowhorn, Rocio Alba-Flores
Abstract:
Traditional classification Convolutional Neural Networks (CNN) attempt to classify an image in its entirety. This becomes problematic when trying to perform classification with a drone’s camera in real-time due to unpredictable backgrounds. Object detectors with bounding boxes can be used to isolate individuals and other items, but the original backgrounds remain within these boxes. These basic detectors have been regularly used to determine what type of object an item is, such as “person” or “dog.” Recent advancement in computer vision, particularly with human imaging, is keypoint detection. Human keypoint detection goes beyond bounding boxes to fully isolate humans and plot points, or Regions of Interest (ROI), on their bodies within an image. ROIs can include shoulders, elbows, knees, heads, etc. These points can then be related to each other and used in deep learning methods such as pose estimation. For drone control based on human motions, poses, or signals using the onboard camera, it is important to have a simple method for pilot identification among multiple individuals while also giving the pilot fine control options for the drone. To achieve this, the OpenPose keypoint detection network was used with body and hand keypoint detection enabled. OpenPose supports the ability to combine multiple keypoint detection methods in real-time with a single network. Body keypoint detection allows simple poses to act as the pilot identifier. The hand keypoint detection with ROIs for each finger can then offer a greater variety of signal options for the pilot once identified. For this work, the individual must raise their non-control arm to be identified as the operator and send commands with the hand on their other arm. The drone ignores all other individuals in the onboard camera feed until the current operator lowers their non-control arm. When another individual wish to operate the drone, they simply raise their arm once the current operator relinquishes control, and then they can begin controlling the drone with their other hand. This is all performed mid-flight with no landing or script editing required. When using a desktop with a discrete NVIDIA GPU, the drone’s 2.4 GHz Wi-Fi connection combined with OpenPose restrictions to only body and hand allows this control method to perform as intended while maintaining the responsiveness required for practical use.Keywords: computer vision, drone control, keypoint detection, openpose
Procedia PDF Downloads 183