Search results for: SQL injection attack detection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4709

Search results for: SQL injection attack detection

4649 The Investigation of the Impact of Process and Location Parameters in Warpage Study of Semiconductor Packages

Authors: Wheyming Song, Ssu-Ping Lin

Abstract:

The primary advantage of package-on-package (PoP) packaging is that since it has less volume, it weighs less. But this is also related to its principal drawback, which is warpage. This research investigates how PoP package warpage patterns are affected by assembling process parameters, including substrate temperature, injection speed, injection temperature, and compound forces. We also investigate how warpage patterns are affected by the location of the silicon chip. The methodologies used in this research are design of experiment and warpage simulation via ANSYS. We propose a regression model to predict the warpage value as a function of substrate temperature, injection speed, injection temperature, and compound forces. Our results show that interaction effects exist between substrate temperature and compound forces and between injection speed and injection temperature. Therefore, determining the optimal values for substrate temperature, compound forces, injection speed, and injection temperature cannot be done individually. Also, our results show that the warpage patterns based on the location of silicon chips can be classified into 11 groups, with the largest warpage occurring at the left-most and right-most sides.

Keywords: package-on-package, warpage, design of experiment, simulation

Procedia PDF Downloads 279
4648 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 30
4647 11-Round Impossible Differential Attack on Midori64

Authors: Zhan Chen, Wenquan Bi

Abstract:

This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions.

Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori

Procedia PDF Downloads 258
4646 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 229
4645 External Sulphate Attack: Advanced Testing and Performance Specifications

Authors: G. Massaad, E. Roziere, A. Loukili, L. Izoret

Abstract:

Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight.

Keywords: monitoring strategy, performance indicator, sulphate attack, mechanism of degradation

Procedia PDF Downloads 294
4644 Effect of Injection Strategy on the Performance and Emission of E85 in a Heavy-Duty Engine under Partially Premixed Combustion

Authors: Amir Aziz, Martin Tuner, Sebastian Verhelst, Oivind Andersson

Abstract:

Partially Premixed Combustion (PPC) is a combustion concept which aims to simultaneously achieve high efficiency and low engine-out emissions. Extending the ignition delay to promote the premixing, has been recognized as one of the key factor to achieve PPC. Fuels with high octane number have been proven to be a good candidates to extend the ignition delay. In this work, E85 (85% ethanol) has been used as a PPC fuel. The aim of this work was to investigate a suitable injection strategy for PPC combustion fueled with E85 in a single-cylinder heavy-duty engine. Single and double injection strategy were applied with different injection timing and the ratio between different injection pulses was varied. The performance and emission were investigated at low load. The results show that the double injection strategy should be preferred for PPC fueled with E85 due to low emissions and high efficiency, while keeping the pressure raise rate at very low levels.

Keywords: E85, partially premixed combustion, injection strategy, performance and emission

Procedia PDF Downloads 158
4643 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 271
4642 Development of a Complete Single Jet Common Rail Injection System Gas Dynamic Model for Hydrogen Fueled Engine with Port Injection Feeding System

Authors: Mohammed Kamil, M. M. Rahman, Rosli A. Bakar

Abstract:

Modeling of hydrogen fueled engine (H2ICE) injection system is a very important tool that can be used for explaining or predicting the effect of advanced injection strategies on combustion and emissions. In this paper, a common rail injection system (CRIS) is proposed for 4-strokes 4-cylinders hydrogen fueled engine with port injection feeding system (PIH2ICE). For this system, a numerical one-dimensional gas dynamic model is developed considering single injection event for each injector per a cycle. One-dimensional flow equations in conservation form are used to simulate wave propagation phenomenon throughout the CR (accumulator). Using this model, the effect of common rail on the injection system characteristics is clarified. These characteristics include: rail pressure, sound velocity, rail mass flow rate, injected mass flow rate and pressure drop across injectors. The interaction effects of operational conditions (engine speed and rail pressure) and geometrical features (injector hole diameter) are illustrated; and the required compromised solutions are highlighted. The CRIS is shown to be a promising enhancement for PIH2ICE.

Keywords: common rail, hydrogen engine, port injection, wave propagation

Procedia PDF Downloads 397
4641 Simulation Study of Asphaltene Deposition and Solubility of CO2 in the Brine during Cyclic CO2 Injection Process in Unconventional Tight Reservoirs

Authors: Rashid S. Mohammad, Shicheng Zhang, Sun Lu, Syed Jamal-Ud-Din, Xinzhe Zhao

Abstract:

A compositional reservoir simulation model (CMG-GEM) was used for cyclic CO2 injection process in unconventional tight reservoir. Cyclic CO2 injection is an enhanced oil recovery process consisting of injection, shut-in, and production. The study of cyclic CO2 injection and hydrocarbon recovery in ultra-low permeability reservoirs is mainly a function of rock, fluid, and operational parameters. CMG-GEM was used to study several design parameters of cyclic CO2 injection process to distinguish the parameters with maximum effect on the oil recovery and to comprehend the behavior of cyclic CO2 injection in tight reservoir. On the other hand, permeability reduction induced by asphaltene precipitation is one of the major issues in the oil industry due to its plugging onto the porous media which reduces the oil productivity. In addition to asphaltene deposition, solubility of CO2 in the aquifer is one of the safest and permanent trapping techniques when considering CO2 storage mechanisms in geological formations. However, the effects of the above uncertain parameters on the process of CO2 enhanced oil recovery have not been understood systematically. Hence, it is absolutely necessary to study the most significant parameters which dominate the process. The main objective of this study is to improve techniques for designing cyclic CO2 injection process while considering the effects of asphaltene deposition and solubility of CO2 in the brine in order to prevent asphaltene precipitation, minimize CO2 emission, optimize cyclic CO2 injection, and maximize oil production.

Keywords: tight reservoirs, cyclic O₂ injection, asphaltene, solubility, reservoir simulation

Procedia PDF Downloads 360
4640 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 162
4639 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 206
4638 Intrarenal Injection of Pentobarbital Sodium for Euthanasia in Cats: 131 Cases, 2010-2011

Authors: Kathleen Cooney, Jennifer Coates, Lesley Leach, Kristin Hrenchir

Abstract:

The objective of this retrospective study was to determine whether intrarenal injection of pentobarbital sodium is a practicable method of euthanasia in client-owned cats. 131 Cats were anesthetized using a combination of tiletamine, zolazepam, and acepromazine given by of subcutaneous or intramuscular injection. Once an appropriate plane of anesthesia was reached, 6 ml of pentobarbital sodium was injected into either the left or right kidney. The patient’s age, sex, estimated weight, presenting condition, estimated dehydration level, palpable characteristics of the kidney pre and post injection, physical response of the cat, and time to cardiopulmonary arrest were recorded. Analysis of 131 records revealed that cats receiving an intrarenal injection of pentobarbital sodium had an average time to cardiopulmonary arrest of 1 minute. The great majority (79%) experienced cardiopulmonary arrest in less than one minute with the remainder experiencing cardiopulmonary arrest between 1 and 8 minutes of the injection. 95% of cats had no observable reaction to intrarenal injection other than cardiopulmonary arrest. In the 19% of cases where kidney swelling was not palpable upon injection, average time to cardiopulmonary arrest increased from 0.9 to 1.6 min. Conclusions and Clinical Relevance: Intrarenal injections of pentobarbital sodium are similar in effect to intravenous methods of euthanasia. Veterinarians who elect to use intrarenal injections can expect cardiopulmonary arrest to occur quickly in the majority of patients with few agonal reactions. Intrarenal injection of pentobarbital sodium in anesthetized cats has ideally suited for cases of owner observed euthanasia when obtaining intravenous access would difficult or disruptive.

Keywords: euthanasia, injection, intrarenal, pentobarbital sodium

Procedia PDF Downloads 319
4637 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems

Authors: M. Okeke, A. Blyth

Abstract:

Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.

Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC

Procedia PDF Downloads 277
4636 A Portable Miniature Syringe Needle Remover And Receptacle For Drug Injection Users

Authors: Fanjun Zhou

Abstract:

In today's drug-ridden society, drug injection is gradually becoming more popular and has hidden danger to IDUs (injection drug users) such as infectious diseases. According to reports, 67% of IDUs reported improper disposal at some point over the prior 30 days, leading to a proliferation of injection needles on the streets. In recent years, the number of cases of children or ordinary people unintentionally picking up needles have increased. Various needle remover inventions have begun to surface, but the existing ones are either expensive, unportable, or risky for IDUs. In order to effectively alleviate the proliferation of drug injection needles and improve the invention of needle removers, a miniature portable needle remover and receptacle is invented. The device for capturing and storing syringe needles contains an upper lid portion mounted tightly onto the lower box portion through an interlock system on the opposing sides of the device with a breaking-twisting mechanism to remove the needle. The invention is intended to be affordable to the general public, safe enough for IDUs to use, reliable enough not to harm others, and effective in breaking needles from the syringe. This report is conducted in the hope of spreading awareness of the dangers of drug injection and to provide a way to mitigate this drug rampant situation.

Keywords: needle remover, drug injection, injection drug users, portable, receptacle

Procedia PDF Downloads 66
4635 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 367
4634 Effect of Waste Foundry Slag and Alccofine on Durability Properties of High Strength Concrete

Authors: Devinder Sharma, Sanjay Sharma, Ajay Goyal, Ashish Kapoor

Abstract:

The present research paper discussed the durability properties of high strength concrete (HSC) using Foundry Slag(FD) as partial substitute for fine aggregates (FA) and Alccofine (AF) in addition to portland pozzolana (PPC) cement. Specimens of Concrete M100 grade with water/binder ratio 0.239, with Foundry Slag (FD) varying from 0 to 50% and with optimum quantity of AF(15%) were casted and tested for durability properties such as Water absorption, water permeability, resistance to sulphate attack, alkali attack and nitrate attack of HSC at the age of 7, 14, 28, 56 and 90 days. Substitution of fine aggregates (FA) with up to 45% of foundry slag(FD) content and cement with 15% substitution and addition of alccofine showed an excellent resistance against durability properties at all ages but showed a decrease in these properties with 50% of FD contents. Loss of weight in concrete samples due to sulphate attack, alkali attack and nitrate attack of HSC at the age of 365 days was compared with loss in compressive strength. Correlation between loss in weight and loss in compressive strength in all the tests was found to be excellent.

Keywords: alccofine, alkali attack, foundry slag, high strength concrete, nitrate attack, water absorption, water permeability

Procedia PDF Downloads 305
4633 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 195
4632 Development of Swing Valve for Gasoline Turbocharger Using Hybrid Metal Injection Molding

Authors: B. S. So, Y. H. Yoon, J. O. Jung, K. S. Bae

Abstract:

Metal Injection Molding (MIM) is a technology that combines powder metallurgy and injection molding. Particularly, it is widely applied to the manufacture of precision mobile parts and automobile turbocharger parts because compact precision parts with complicated three-dimensional shapes that are difficult to machining are formed into a large number of finished products. The swing valve is a valve that adjusts the boost pressure of the turbocharger. Since the head portion is exposed to the harsh temperature condition of about 900 degrees in the gasoline GDI engine, it is necessary to use Inconel material with excellent heat resistance and abrasion resistance, resulting in high manufacturing cost. In this study, we developed a swing valve using a metal powder injection molding based hybrid material (Inconel 713C material with heat resistance is applied to the head part, and HK30 material with low price is applied to the rest of the body part). For this purpose, the process conditions of the metal injection molding were optimized to minimize the internal defects, and the effectiveness was confirmed by the fracture strength and fatigue test.

Keywords: hybrid metal injection molding, swing valve, turbocharger, double injection

Procedia PDF Downloads 186
4631 Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent

Authors: K. Nirmalkumar

Abstract:

An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted.

Keywords: corrosion, calcium nitrite, concrete, fly ash

Procedia PDF Downloads 245
4630 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 373
4629 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 167
4628 Recombination Center Levels in Gold and Platinum Doped N-Type Silicon

Authors: Nam Chol Yu, Kyong Il Chu

Abstract:

Using DLTS measurement techniques, we determined the dominant recombination center levels (defects of both A and B) in gold and platinum doped n-type silicon. Also, the injection and temperature dependence of the Shockley-Read-Hall (SRH) carrier lifetime was studied under low-level injection and high-level injection. Here measurements show that the dominant level under low-level injection located at EC-0.25eV(A) correlated to the Pt+G1 and the dominant level under high-level injection located at EC-0.54eV(B) correlated to the Au+G4. Finally, A and B are the same dominant levels for controlling the lifetime in gold-platinum doped n-silicon.

Keywords: recombination center level, lifetime, carrier lifetime control, gold, platinum, silicon

Procedia PDF Downloads 129
4627 Effect of Variation of Injection Timing on Performance and Emission Characteristics of Compression Ignition Engine: A CFD Approach

Authors: N. Balamurugan, N. V. Mahalakshmi

Abstract:

Compression ignition (CI) engines are known for their high thermal efficiency in comparison with spark-ignited (SI) engines. This makes CI engines a potential candidate for the future prime source of power for transportation sector to reduce greenhouse gas emissions and to shrink carbon footprint. However, CI engines produce high levels of NOx and soot emissions. Conventional methods to reduce NOx and soot emissions often result in the infamous NOx-soot trade-off. The injection parameters are one of the most important factors in the working of CI engines. The engine performance, power output, economy etc., is greatly dependent on the effectiveness of the injection parameters. The injection parameter has their direct impact on combustion process and pollutant formation. The injection parameter’s values are required to be optimised according to the application of the engine. Control of fuel injection mode is one method for reduction of NOx and soot emissions that is achievable. This study aims to assess, compare and analyse the influence of the effect of injection characteristics that is SOI timing studied on combustion and emissions in in-cylinder combustion processes with that of conventional DI Diesel Engine system using the commercial Computational Fluid Dynamic (CFD) package STAR- CD ES-ICE.

Keywords: variation of injection timing, compression ignition engine, spark-ignited, Computational Fluid Dynamic

Procedia PDF Downloads 266
4626 A New DIDS Design Based on a Combination Feature Selection Approach

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.

Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree

Procedia PDF Downloads 372
4625 Recombination Center Levels in Gold and Platinum Doped N-type Silicon for High-Speed Thyristor

Authors: Nam Chol Yu, GyongIl Chu, HoJong Ri

Abstract:

Using DLTS (Deep-level transient spectroscopy) measurement techniques, we determined the dominant recombination center levels (defects of both A and B) in gold and platinum doped n-type silicon. Also, the injection and temperature dependence of the Shockley-Read-Hall (SRH) carrier lifetime was studied under low-level injection and high-level injection. Here measurements show that the dominant level under low-level injection located at EC-0.25 eV (A) correlated to the Pt+G1 and the dominant level under high-level injection located at EC-0.54 eV (B) correlated to the Au+G4. Finally, A and B are the same dominant levels for controlling the lifetime in gold-platinum doped n-silicon.

Keywords: recombination center level, lifetime, carrier lifetime control, Gold, Platinum, Silicon

Procedia PDF Downloads 40
4624 Prevalence of Drug Injection among Male Prisoners in the West of Iran

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh

Abstract:

Background: Substance addiction is one of the major worldwide problems that destroys economy, familial relationships, and the abuser’s career and has several side effects; in the meantime drug injection due to the possibility of shared use of syringes among drug users could have multiple complications to be followed. The purpose of this study was to determine the prevalence of drug injection among male prisoners in Kermanshah city, the west of Iran. Methods: In this cross-sectional study 615 male prisoners were randomly selected to participate voluntarily in the study. Participants filled out a writing self-report questionnaire. Data were analyzed by the SPSS software (ver. 21.0) at 95% significant level. Results: The mean age of respondents was 31.13 years [SD: 7.76]. Mean initiation age for drug use was 14.36 years (range, 9-34 years). Almost, 39.4 % reported a history of drug use before prison. Opium (33.2%) and crystal (27.1%) was the most used drug among prisoners. Furthermore, 9.3 % had a history of injection addiction. There was a significant correlation between age, crime type, marital status, economic status, unprotected sex and drug injection (P < 0.05). Conclusion: The low age of drug abuse and the prevalence of drug injection among offenders can be as a warning for responsible; in this regard, implementation of prevention programs to risky behavior and harm reduction among high-risk groups can follow useful results.

Keywords: substance abuse, drug injection, prison, Iran

Procedia PDF Downloads 465
4623 When and How Do Individuals Transition from Regular Drug Use to Injection Drug Use in Uganda? Findings from a Rapid Assessment

Authors: Stanely Nsubuga

Abstract:

Background In Uganda, injection drug use is a growing but less studied problem. Preventing the transition to injection drug use may help prevent blood-borne viral transmission, but little is known about when and how people transition to injection drug use. A greater understanding of this transition process may aid in the country’s efforts to prevent the continued growth of injection drug use, HIV, and hepatitis C Virus (HCV) infection among people who inject drugs (PWID). Methods Using a rapid situation assessment framework, we conducted semi-structured interviews among 125 PWID (102 males and 23 females)—recruited through outreach and snow-ball sampling. Participants were interviewed about their experiences on when and how they transitioned into injection drug use and these issues were also discussed in 12 focus groups held with the participants. Results All the study participants started their drug use career with non-injecting forms including chewing, smoking, and sniffing before transitioning to injecting. Transitioning was generally described as a peer-driven and socially learnt behavior. The participants’ social networks and accessibility to injectable drugs on the market and among close friends influenced the time lag between first regular drug use and first injecting—which took an average of 4.5 years. By the age of 24, at least 81.6% (95.7% for females and 78.4% for males) had transitioned into injecting. Over 84.8% shared injecting equipment during their first injection, 47.2% started injecting because a close friend was already injecting, 26.4% desired to achieve a greater “high” (26.4%) which could reflect drug-tolerance, and 12% out of curiosity.

Keywords: People who Use Drugs, transition, injection drug use, Uganda

Procedia PDF Downloads 102
4622 Effects of Injection Conditions on Flame Structures in Gas-Centered Swirl Coaxial Injector

Authors: Wooseok Song, Sunjung Park, Jongkwon Lee, Jaye Koo

Abstract:

The objective of this paper is to observe the effects of injection conditions on flame structures in gas-centered swirl coaxial injector. Gaseous oxygen and liquid kerosene were used as propellants. For different injection conditions, two types of injector, which only differ in the diameter of the tangential inlet, were used in this study. In addition, oxidizer injection pressure was varied to control the combustion chamber pressure in different types of injector. In order to analyze the combustion instability intensity, the dynamic pressure was measured in both the combustion chamber and propellants lines. With the increase in differential pressure between the propellant injection pressure and the combustion chamber pressure, the combustion instability intensity increased. In addition, the flame structure was recorded using a high-speed camera to detect CH* chemiluminescence intensity. With the change in the injection conditions in the gas-centered swirl coaxial injector, the flame structure changed.

Keywords: liquid rocket engine, flame structure, combustion instability, dynamic pressure

Procedia PDF Downloads 205
4621 Investigation on the Effect of Sugarcane Bagasse/HDPE Composition on the Screw Withdrawal Resistance of Injection Molded Parts

Authors: Seyed Abdol Mohammad Rezavand, Mohammad Nikbakhsh

Abstract:

Withdrawal resistance of screws driven into HDPE/Sugarcane Bagasse injection molded parts was investigated. After chemical treatment and drying, SCB was pre-mixed with HDPE using twin extruder. The resulting granules are used in producing samples in injection molding machine. SCB with the quantity of %10, %20, and %30 was used. By using a suitable fixture, screw heads can take with tensile test machine grips. Parts with screws in the center and edge were fasten together. Then, withdrawal resistance was measured with tensile test machine. Injection gate is at the one edge of the part. The results show that by increasing SCB content in composite, the withdrawal resistance is decreased. Furthermore, the withdrawal resistance at the edges (near injection gate and the end of the filling path of mold cavity) is more than that of the center.

Keywords: polyethylene, sugarcane bagasse, wood plastic, screw, withdrawal resistance

Procedia PDF Downloads 557
4620 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 256