Search results for: malicious attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 654

Search results for: malicious attacks

234 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 324
233 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 478
232 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 429
231 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork

Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting

Abstract:

This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.

Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark

Procedia PDF Downloads 264
230 Combating Islamophobia in Australia: An Analysis of Six Legal and Holistic Strategies to Help Address Discrimination towards Muslims

Authors: F. Zamani Ashni, P. Gerber

Abstract:

In today's religious and political climate, Muslims find themselves the focus of much attention, often in the form of discrimination and vilification. There is a widely held belief that Islam and terrorism are inextricably intertwined. An anti-Muslim narrative has been shaping policy around the world for some time now. This study, which focuses on the experience of Muslims in Australia, provides guidance on legislative and other steps that can be taken by Australia to help address Islamophobia. This study provides a doctrinal analysis of the state, territory, and federal anti-discrimination laws in Australia. Using principles of statutory interpretation along aside an analysis of relevant jurisprudence, this study concludes that Australian anti-discrimination laws are ill-equipped to address modern-day Islamophobia. The study also finds that laws alone are insufficient to combat Islamophobia, and a more holistic approach is required. Six strategies are identified, which can, in combination, help to successfully respond to Islamophobia. In addition to legislative initiatives, combating Islamophobia requires Australia to promote inclusive human rights education, fair media coverage, strong leadership, integration of the Islamic community, and comprehensive documentation of anti-Muslim attacks.

Keywords: Australia, discrimination, Islamophobia, Muslim

Procedia PDF Downloads 128
229 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 129
228 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme

Authors: Cavidan Yakupoglu, Kurt Rohloff

Abstract:

In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.

Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE

Procedia PDF Downloads 146
227 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 271
226 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 92
225 Structural Correlates of Reduced Malicious Pleasure in Huntington's Disease

Authors: Sandra Baez, Mariana Pino, Mildred Berrio, Hernando Santamaria-Garcia, Lucas Sedeno, Adolfo Garcia, Sol Fittipaldi, Agustin Ibanez

Abstract:

Schadenfreude refers to the perceiver’s experience of pleasure at another’s misfortune. This is a multidetermined emotion which can be evoked by hostile feelings and envy. The experience of Schadenfreude engages mechanisms implicated in diverse social cognitive processes. For instance, Schadenfreude involves heightened reward processing, accompanied by increased striatal engagement and it interacts with mentalizing and perspective-taking abilities. Patients with Huntington's disease (HD) exhibit reductions of Schadenfreude experience, suggesting a role of striatal degeneration in such an impairment. However, no study has directly assessed the relationship between regional brain atrophy in HD and reduced Schadenfreude. This study investigated whether gray matter (GM) atrophy in HD patients correlates with ratings of Schadenfreude. First, we compared the performance of 20 HD patients and 23 controls on an experimental task designed to trigger Schadenfreude and envy (another social emotion acting as a control condition). Second, we compared GM volume between groups. Third, we examined brain regions where atrophy might be associated with specific impairments in the patients. Results showed that while both groups showed similar ratings of envy, HD patients reported lower Schadenfreude. The latter pattern was related to atrophy in regions of the reward system (ventral striatum) and the mentalizing network (precuneus and superior parietal lobule). Our results shed light on the intertwining of reward and socioemotional processes in Schadenfreude, while offering novel evidence about their neural correlates. In addition, our results open the door to future studies investigating social emotion processing in other clinical populations characterized by striatal or mentalizing network impairments (e.g., Parkinson’s disease, schizophrenia, autism spectrum disorders).

Keywords: envy, Gray matter atrophy, Huntigton's disease, Schadenfreude, social emotions

Procedia PDF Downloads 329
224 Impoliteness Principle in Online Chatroom Discourses

Authors: Christiana Darkoah

Abstract:

This study investigated impolite behaviour in online chatroom conversations, looking at its expressions, origins, online chatroom participant responses, impacts, and possible interventions. Online impoliteness has become a major worry as technology improvements move public conversation online, causing communication breakdowns and escalating conflict. The study used a qualitative methodology, including observation and thematic analysis to examine interactions from Facebook, Instagram, and WhatsApp. The findings showed that in online chatrooms, face-threatening behaviours and disputes can be sparked by political remarks, conversational humour, picture interpretations, and personal disclosures. Depending on the situation, the interpreter's job, and the accepted standards, the same statement could be interpreted as disrespectful or courteous. Impolite behaviour in online chatrooms and the possibility of misinterpretation are evident in the furious reactions that can arise from seemingly harmless posts. According to the study's findings, impoliteness is common in online chat rooms, where disputes over politics and personal grievances frequently turn into written attacks. Creating unambiguous community norms in partnership with social media businesses and putting digital literacy campaigns into action are among the recommendations.

Keywords: impoliteness, online chatroom, discourses, conflicts

Procedia PDF Downloads 7
223 Enhancing Robustness in Federated Learning through Decentralized Oracle Consensus and Adaptive Evaluation

Authors: Peiming Li

Abstract:

This paper presents an innovative blockchain-based approach to enhance the reliability and efficiency of federated learning systems. By integrating a decentralized oracle consensus mechanism into the federated learning framework, we address key challenges of data and model integrity. Our approach utilizes a network of redundant oracles, functioning as independent validators within an epoch-based training system in the federated learning model. In federated learning, data is decentralized, residing on various participants' devices. This scenario often leads to concerns about data integrity and model quality. Our solution employs blockchain technology to establish a transparent and tamper-proof environment, ensuring secure data sharing and aggregation. The decentralized oracles, a concept borrowed from blockchain systems, act as unbiased validators. They assess the contributions of each participant using a Hidden Markov Model (HMM), which is crucial for evaluating the consistency of participant inputs and safeguarding against model poisoning and malicious activities. Our methodology's distinct feature is its epoch-based training. An epoch here refers to a specific training phase where data is updated and assessed for quality and relevance. The redundant oracles work in concert to validate data updates during these epochs, enhancing the system's resilience to security threats and data corruption. The effectiveness of this system was tested using the Mnist dataset, a standard in machine learning for benchmarking. Results demonstrate that our blockchain-oriented federated learning approach significantly boosts system resilience, addressing the common challenges of federated environments. This paper aims to make these advanced concepts accessible, even to those with a limited background in blockchain or federated learning. We provide a foundational understanding of how blockchain technology can revolutionize data integrity in decentralized systems and explain the role of oracles in maintaining model accuracy and reliability.

Keywords: federated learning system, block chain, decentralized oracles, hidden markov model

Procedia PDF Downloads 56
222 System Survivability in Networks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.

Keywords: defense/attack strategies, information, networks, reliability, survivability

Procedia PDF Downloads 387
221 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 398
220 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 185
219 Experimental Investigation of Damaged Reinforced Concrete Beams Repaired with Carbon Fibre Reinforced Polymer (CFRP) Strip under Impact Loading

Authors: M. Al-Farttoosi, M. Y. Rafiq, J. Summerscales, C. Williams

Abstract:

Many buildings and bridges are damaged due to impact loading, explosions, terrorist attacks and wars. Most of the damaged structures members such as beams, columns and slabs are not totally failed and it can be repaired. Nowadays, carbon fibre reinforced polymer CFRP has been wildly used in strengthening and retrofitting the structures members. CFRP can rector the load carrying capacity of the damaged structures members to make them serviceable. An experimental investigation was conducted to investigate the impact behaviour of the damaged beams repaired with CFRP. The tested beams had different degrees of damage and near surface mounted technique NSM was used to install the CFRP. A heavy drop weight impact test machine was used to conduct the experimental work. The study investigated the impact strength, stiffness, cracks and deflection of the CFRP repaired beams. The results show that CFRP significantly increased the impact resistance of the damaged beams. CFRP increased the damaged beams stiffness and reduced the deflection. The results showed that the NSM technique is more effective in repairing beams and preventing the debonding of the CFRP.

Keywords: damaged, concrete, impact, repaired

Procedia PDF Downloads 339
218 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 279
217 Human Wildlife Conflict Outside Protected Areas of Nepal: Causes, Consequences and Mitigation Strategies

Authors: Kedar Baral

Abstract:

This study was carried out in Mustang, Kaski, Tanahun, Baitadi, and Jhapa districts of Nepal. The study explored the spatial and temporal pattern of HWC, socio economic factors associated with it, impacts of conflict on life / livelihood of people and survival of wildlife species, and impact of climate change and forest fire onHWC. Study also evaluated people’s attitude towards wildlife conservation and assessed relevant policies and programs. Questionnaire survey was carried out with the 250 respondents, and both socio-demographic and HWC related information werecollected. Secondary information were collected from Divisional Forest Offices and Annapurna Conservation Area Project.HWC events were grouped by season /months/sites (forest type, distances from forest, and settlement), and the coordinates of the events were exported to ArcGIS. Collected data were analyzed using descriptive statistics in Excel and R Program. A total of 1465 events were recorded in 5 districts during 2015 and 2019. Out of that, livestock killing, crop damage, human attack, and cattle shed damage events were 70 %, 12%, 11%, and 7%, respectively. Among 151 human attack cases, 23 people were killed, and 128 were injured. Elephant in Terai, common leopard and monkey in Middle Mountain, and snow leopard in high mountains were found as major problematic animals. Common leopard attacks were found more in the autumn, evening, and on human settlement area. Whereas elephant attacks were found higher in winter, day time, and on farmland. Poor people farmers were found highly victimized, and they were losing 26% of their income due to crop raiding and livestock depredation. On the other hand, people are killing many wildlife in revenge, and this number is increasing every year. Based on the people's perception, climate change is causing increased temperature and forest fire events and decreased water sources within the forest. Due to the scarcity of food and water within forests, wildlife are compelled to dwell at human settlement area, hence HWC events are increasing. Nevertheless, more than half of the respondents were found positive about conserving entire wildlife species. Forests outside PAs are under the community forestry (CF) system, which restored the forest, improved the habitat, and increased the wildlife.However, CF policies and programs were found to be more focused on forest management with least priority on wildlife conservation and HWC mitigation. Compensation / relief scheme of government for wildlife damage was found some how effective to manage HWC, but the lengthy process, being applicable to the damage of few wildlife species and highly increasing events made it necessary to revisit. Based on these facts, the study suggest to carry out awareness generation activities to the poor farmers, linking the property of people with the insurance scheme, conducting habitat management activities within CF, promoting the unpalatable crops, improvement of shed house of livestock, simplifying compensation scheme and establishing a fund at the district level and incorporating the wildlife conservation and HWCmitigation programs in CF. Finally, the study suggests to carry out rigorous researches to understand the impacts of current forest management practices on forest, biodiversity, wildlife, and HWC.

Keywords: community forest, conflict mitigation, wildlife conservation, climate change

Procedia PDF Downloads 114
216 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security

Authors: Serkan Kocapinar

Abstract:

Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.

Keywords: ISIS, security, terrorism, threats

Procedia PDF Downloads 291
215 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 99
214 Causes of Terrorism: Perceptions of University Students of Teacher Training Institutions

Authors: Saghir Ahmad, Abid Hussain Ch, Misbah Malik, Ayesha Batool

Abstract:

Terrorism is the marvel in which dreadful circumstance is made by a gathering of individuals who view themselves as abused by society. Terrorism is the unlawful utilization of power or viciousness by a man or a sorted out gathering by the general population or property with the aim of intimidation or compulsion of social orders or governments frequently for ideological or political reasons. Terrorism is as old as people. The main aim of the study was to find out the causes of terrorism through the perceptions of the universities students of teacher training institutions. This study was quantitative in nature. Survey method was used to collect data. A sample of two hundred and sixty seven students was selected from public universities. A five point Likert scale was used to collect data. Mean, Standard deviation, independent sample t-test, and One Way ANOVA were applied to analyze the data. The major findings of the study indicated that students perceived the main causes of terrorism are poverty, foreign interference, wrong concept of Islamization, and social injustice. It is also concluded that mostly, students think that drone attacks are promoting the terrorist activities. The education is key to eliminate the terrorism. There is need to educate the people and specially youngsters to bring the peace in the world.

Keywords: dreadful circumstance, governments, power, students, terrorism

Procedia PDF Downloads 541
213 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments

Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem

Abstract:

The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).

Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar

Procedia PDF Downloads 231
212 Bridges Seismic Isolation Using CNT Reinforced Polymer Bearings

Authors: Mohamed Attia, Vissarion Papadopoulos

Abstract:

There is no doubt that there is a continuous deterioration of structures as a result of multiple hazards which can be divided into natural hazards (e.g., earthquakes, floods, winds) and other hazards due to human behavior (e.g., ship collisions, excessive traffic, terrorist attacks). There have been numerous attempts to address the catastrophic consequences of these hazards and traditional solutions through structural design and safety factors within the design codes, but there has not been much research addressing solutions through the use of new materials that have high performance and can be more effective than usual materials such as reinforced concrete and steel. To illustrate the effect of one of the new high-performance materials, carbon nanotube-reinforced polymer (CNT/polymer) bearings with different weight fractions were simulated as structural components of seismic isolation using ABAQUS in the connection between a bridge superstructure and the substructure. The results of the analyzes showed a significant increase in the time period of the bridge and a clear decrease in the bending moment at the base of the bridge piers at each time step of the time-history analysis in the case of using CNT/polymer bearings compared to the case of direct contact between the superstructure of the bridge and the substructure.

Keywords: seismic isolation, bridges damage, earthquake hazard, earthquake resistant structures

Procedia PDF Downloads 188
211 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)

Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi

Abstract:

Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.

Keywords: vanname, shrimp, WSSV, viral protein 19

Procedia PDF Downloads 530
210 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 354
209 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 365
208 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite

Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong

Abstract:

Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.

Keywords: optical remote sensing satellite, always running on the sun-synchronous

Procedia PDF Downloads 395
207 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 36
206 Human-Tiger Conflict in Chitwan National Park, Nepal

Authors: Abishek Poudel

Abstract:

Human-tiger conflicts are serious issues of conflicts between local people and park authority and the conflicting situation potentially play negative role in park management. The study aimed (1) To determine the trend and nature of human-tiger conflicts (2) To understand people's perception and mitigation measures towards tiger conservation. Both primary and secondary information were used to determine human- tiger conflicts in Chitwan National Park. Systematic random sampling with 5% intensity was done to collect the perception of the villagers regarding human-tiger conflicts. The study sites were selected based on frequencies of incidences of human attacks and livestock depredation viz. Rajahar and Ayodhyapuri VDCs respectively. The trend of human casualties by tiger has increased in last five year whereas the trend of livestock has decreased. Reportedly, between 2008 and 2012, tigers killed 22 people, injured 10 and killed at least 213 livestock. Conflict was less common in the park and more intense in the sub-optimal habitats of Buffer Zone. Goat was the most vulnerable livestock followed by cattle. The livestock grazing and human intrusion into tiger habitat were the causes of conflicts. Developing local stewardship and support for tiger conservation, livestock insurance, and compensation policy simplification may help reduce human-tiger conflicts.

Keywords: livestock depredation, sub optimal habitat, human-tiger, local stewardship

Procedia PDF Downloads 460
205 Infestations of Olive Fruit Fly, Bactrocera oleae (Rossi) (Diptera: Tephritidae), in Different Olive Cultivars in Çanakkale, Turkey

Authors: Hanife Genç

Abstract:

The olive fruit fly, Bactrocera oleae (Rossi), is an economically important and endemic pest in olive (Oleae europae) orchards in Turkey. The aim of this study was to determine olive fruit fly infestation in different olive cultivars in the laboratory. Olive fly infested fruits were collected in Çanakkale province to establish wild fly population. After having reproductive olive fly colonies, 14 olive cultivars were tested in the controlled laboratory conditions, at 23±2 °C, 65% RH and 16:8 h (light: dark) photoperiod. The olive samples from 14 different olive cultivars were collected in October 2015, in Campus of Dardanos, Çanakkale Onsekiz Mart University. Observations were carried out detecting some biological parameters such as the number of oviposition stings, active infestation, total infestation, the number of pupae and the adult emergence. The results indicated that oviposition stings were not associated with pupal yield. A few pupae were found within olive fruits which were not able to exit. Screening of the varieties suggested that less susceptible cultivar to olive fruit fly attacks was Arbequin while Gemlik-2M 2/3 showed significant susceptibility. Ovipositional preference of olive fly females and the success of larval development in different olive varieties are crucial for establishing new olive orchards to prevent high olive fruit fly infestation.

Keywords: infestation, olive fruit fly, olive cultivars, oviposition sting

Procedia PDF Downloads 212