Search results for: man in middle attack
2159 Factors Influencing the Roles and Responsibilities of Middle Leaders in Saudi and English Primary Schools: A Comparative Critical Study
Authors: Saeed Musaid H. Alzahrani
Abstract:
The role of middle leaders, especially in primary schools, is a multi-faced role that has been subject to changes in nature over recent decades, with claims for more distributed leadership practices. This research examines the way 18 middle leaders in Saudi and English primary schools conceptualise their roles and responsibilities, and different factors influencing those roles and responsibilities. It begins from the premise that both the power of the role and the values of middle leaders are grounded in cultural and political bases, a belief held by the researcher as an 'insider' within the Saudi educational leadership context. The study consisted of a comparative analysis of the role and the responsibilities of middle leaders in Saudi primary schools and their equivalents in English primary schools. A purely qualitative methodological stance was adopted, using in-depth face-to-face semi-structured interviews, observations and document analysis. Middle leaders were asked to reflect deeply on their perceptions and understanding of their roles and explain what they thought influenced their daily practices and responsibilities. The findings suggest that the concept of middle leadership has been influenced by power imposed from above by political authority, via internal and external hierarchical structures, which shapes the nature of the role of the middle leaders and forces them to comply. Middle leaders seem to believe they have the power to make decisions and promote change, but these findings suggest that this is illusory. The power that keeps middle leaders performing is the power of their cultural and religious values. Those values are the resource to which they turn in their search for more energy when they lack support and are short of time taken. Middle leaders in Saudi, just like their equivalents in English schools must comply with the requirements of their role. However, Saudi middle leaders are given no leeway to make decisions or implement change, neither do they have the culture of collegiality that seems to give middle leaders in England more power over their resources and decisions. However, in neither educational setting have middle leaders been given the power to lead, so they remain managers rather than leaders. The findings of this research suggest that there are more similarities between the educational settings of Saudi and England than differences; and in the light of different factors identified in the study, suggest the establishment of a framework for middle leadership, in the hope of enhancing the way the role is practiced.Keywords: middle leader, primary school, power, educational leadership, value, culture, model, Saudi Arabia, England
Procedia PDF Downloads 1922158 System Survivability in Networks in the Context of Defense/Attack Strategies: The Large Scale
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad
Abstract:
We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-based- and the defender-based-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance of successfully sending the flow to the destination node. The attacker however will select the cut-set with the highest chance to be disabled in order to partition the network. Moreover, we extend the problem to the case of selecting the best p paths to operate by the defender and the best k cut-sets to target by the attacker, for arbitrary integers p,k > 1. We investigate some variations of the problem and suggest polynomial-time solutions.Keywords: defense/attack strategies, large scale, networks, partitioning a network
Procedia PDF Downloads 2832157 Autonomy in Healthcare Organisations: A Comparative Case Study of Middle Managers in England and Iran
Authors: Maryam Zahmatkesh
Abstract:
Middle managers form a significant occupational category in organisations. They undertake a vital role, as they sit between the operational and strategic roles. Traditionally they were acting as diplomat administrators, and were only in power to meet the demands of professionals. Following the introduction of internal market, in line with the principles of New Public Management, middle managers have been considered as change agents. More recently, in the debates of middle managers, there is emphasis on entrepreneurialism and enacting strategic role. It was assumed that granting autonomy to the local organisations and the inception of semi-autonomous hospitals (Foundation Trusts in England and Board of Trustees in Iran) would give managers more autonomy to act proactively and innovatively. This thesis explores the hospital middle managers’ perception of and responses to public management reforms (in particular, hospital autonomy) in England and Iran. In order to meet the aims of the thesis, research was undertaken within the interpretative paradigm, in line with social constructivism. Data were collected from interviews with forty-five middle managers, observational fieldwork and documentary analysis across four teaching university hospitals in England and Iran. The findings show the different ways middle managers’ autonomy is constrained in the two countries. In England, middle managers have financial and human recourses, but their autonomy is constrained by government policy and targets. In Iran, middle managers are less constrained by government policy and targets, but they do not have financial and human resources to exercise autonomy. Unbalanced autonomy causes tension and frustration for middle managers. According to neo-institutional theory, organisations are deeply embedded within social, political, economic and normative settings that exert isomorphic and internal population-level pressures to conform to existing and established modes of operation. Health systems which are seeking to devolve autonomy to middle managers must appreciate the multidimensional nature of the autonomy, as well as the wider environment that organisations are embedded, if they are about to improve the performance of managers and their organisations.Keywords: autonomy, healthcare organisations, middle managers, new public management
Procedia PDF Downloads 3102156 Analyzing Middle Actors' Influence on Land Use Policy: A Case Study in Central Kalimantan, Indonesia
Authors: Kevin Soubly, Kaysara Khatun
Abstract:
This study applies the existing Middle-Out Perspective (MOP) as a complementing analytical alternative to the customary dichotomous options of top-down vs. bottom-up strategies of international development and commons governance. It expands the framework by applying it to a new context of land management and environmental change, enabling fresh understandings of decision making around land use. Using a case study approach in Central Kalimantan, Indonesia among a village of indigenous Dayak, this study explores influences from both internal and external middle actors, utilizing qualitative empirical evidence and incorporating responses across 25 village households and 11 key stakeholders. Applying the factors of 'agency' and 'capacity' specific to the MOP, this study demonstrates middle actors’ unique capabilities and criticality to change due to their influence across various levels of decision-making. Study results indicate that middle actors play a large role, both passively and actively, both directly and indirectly, across various levels of decision-making, perception-shaping, and commons governance. In addition, the prominence of novel 'passive' middle actors, such as the internet, can provide communities themselves with a level of agency beyond that provided by other middle actors such as NGOs and palm oil industry entities – which often operate at the behest of the 'top' or out of self-interest. Further, the study posits that existing development and decision-making frameworks may misidentify the 'bottom' as the 'middle,' raising questions about traditional development and livelihood discourse, strategies, and support, from agricultural production to forest management. In conclusion, this study provides recommendations including that current policy preconceptions be reevaluated to engage middle actors in locally-adapted, integrative manners in order to improve governance and rural development efforts more broadly.Keywords: environmental management, governance, Indonesia, land use, middle actors, middle-out perspective
Procedia PDF Downloads 1152155 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1432154 The Development of a School-Based Wellbeing Programme to Enhance the Social Functioning of Learners in Middle Childhood
Authors: Soretha Beets, Izanette Van Schalkwyk, Doret K. Kirsten
Abstract:
Children in middle childhood are exposed to various risks, for example, risks associated with poverty and/or dysfunctional families, that may threaten their social functioning. The aim of this study was to develop and design a programme that can be presented to children in middle childhood in order to enhance their social functioning towards better wellbeing. The skills and competencies needed to be included in the programme were identified by means of a literature review and 4 focus groups with educators from 4 sub-areas in a certain district in the North-West Province of South Africa. The programme consists of 8 sessions, presented in a certain order. The sessions cover the following aspects: self-esteem and gratitude, self-regulation and goal-setting, values and relationships, communication and listening, conflict management, emotional competence, and resilient coping. These aspects may benefit children in the middle child’s wellbeing and live on the short-term and may also hold long-term benefits.Keywords: middle childhood, programme development, social functioning, wellbeing
Procedia PDF Downloads 1592153 Civil-Military Relations in Turkey, Europe, and Middle East
Authors: Dorsa Bakhshandehgeyazdi
Abstract:
This article tries to comprehend the change of Turkish common military relations in an analogical viewpoint. The investigation is taking into account two criteria: institutional / legitimate systems and political oversight of the military's self-sufficiency. Examination of European furthermore, Middle Eastern common military relations models to the Turkish ideal model discloses grave contrasts in the middle of Turkish and Middle Eastern common military relations. The Turkish model in change for not less than 10 years is closer to the European show in both lawful and political perspectives. However, the article underscores that Turkish common military relations are still in change and despite the fact that the EU increase procedure has continuously democratized the legitimate arrangement of the nation, law based combining obliges further advances in the political area. A the result, stabilization in Turkey depends not just on withdrawing of the military from the political domain, additionally on the best possible civilization of the administration in hypothesis and practice.Keywords: Turkish common military, institutional, legitimate systems, political oversight, middle Eastern common military
Procedia PDF Downloads 4702152 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs
Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny
Abstract:
As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning
Procedia PDF Downloads 2112151 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry
Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap
Abstract:
Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry
Procedia PDF Downloads 802150 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell
Authors: Gigih Supriyatno
Abstract:
SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.Keywords: web forensic, SQL injection, investigation, web shell
Procedia PDF Downloads 1482149 Roles Currently Played by Educational Middle Leaders
Authors: Elaine Marta Pereira Aaltonen
Abstract:
Effective school leadership materialised in educational settings through the high standard professional performance of senior and middle leaders, has increasingly become an education policy priority around the world due to a wide recognition that schools need knowledgeable, skilled, and committed leaders, along with great teachers, in order to ensure outstanding education at all levels of schooling. The scope of this paper is the work of middle leaders, whose direct influence on teachers and classroom teaching, thus, on student learning outcomes, is a key component for successful school systems. It particularly aims at sharing some of the findings obtained through an academic study recently carried out by the same researcher, which was focused on enhancing understanding about aspects related to the professional performance of educational middle leaders, applied to the context of the lower elementary school division of a private mainstream school located in Brazil. The master´s dissertation findings included identifying the roles performed by a team of educational middle leaders throughout the year of 2021, as well as gaining insights on their perceptions about the roles performed, both through an electronic questionnaire and individual face-to-face interviews. Not only the roles of the middle leaders who participated in the research have been identified through the qualitative case study undertaken, but additional research finding lying within the sphere of the categorisation of such roles, based upon coherent domains of practice, has possibly been made. Hence, the main purpose of this paper is to outline the findings concerning the current roles played by educational middle leaders.Keywords: roles, middle leaders, educational leadership, school leadership, and management
Procedia PDF Downloads 1042148 Experimental Investigation of S822 and S823 Wind Turbine Airfoils Wake
Authors: Amir B. Khoshnevis, Morteza Mirhosseini
Abstract:
The paper deals with a sub-part of an extensive research program on the wake survey method in various Reynolds numbers and angles of attack. This research experimentally investigates the wake flow characteristics behind S823 and S822 airfoils in which designed for small wind turbines. Velocity measurements determined by using hot-wire anemometer. Data acquired in the wake of the airfoil at locations(c is the chord length): 0.01c - 3c. Reynolds number increased due to increase of free stream velocity. Results showed that mean velocity profiles depend on the angle of attack and location of data collections. Data acquired at the low Reynolds numbers (smaller than 10^5). Effects of Reynolds numbers on the mean velocity profiles are more significant in near locations the trailing edge and these effects decrease by taking distance from trailing edge toward downstream. Mean velocity profiles region increased by increasing the angle of attack, except for 7°, and also the maximum velocity deficit (velocity defect) increased. The difference of mean velocity in and out of the wake decreased by taking distance from trailing edge, and mean velocity profile become wider and more uniform.Keywords: angle of attack, Reynolds number, velocity deficit, separation
Procedia PDF Downloads 3772147 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco
Authors: Karima Djebaili, Lamine Melkemi
Abstract:
Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting
Procedia PDF Downloads 4512146 Investigation of Flow Structure over X-45 Type Non-Slender Delta Wing Planform
Authors: B. Yanıktepe, C. Özalp, B. Şahin
Abstract:
Delta wing planform is an essential aerodynamic configuration, which could be effectively used at relatively high angles of attack than conventional wings in subsonic flow conditions. The flow over delta wings can be characterized by a pair of leading edge vortices emanating from wing apex. Boundary layer separation causes these vortical structures formed by rolling up of viscous flow sheet. This flow separation mechanism is occurred due to angle of attack and sharp leading edges of the delta wing. Therefore, complexity and variety in planform designs rise to catch the best under abnormal flow conditions. The present experimental study investigates the near surface flow structure and aerodynamic flow characteristics of X-45 type non-slender delta wing planform using dye visualization, Stereoscopic Particle Image Velocimetry (stereo-PIV). The instantaneous images are acquired on the plan-view plane within 5o≤α≤20o to calculate the time-averaged flow data. It can be concluded that vortical flow with a pair of well-defined LEVs over X-45 develop at very low angles of attack, secondary vortex are also evident and form close to the wing surface similar to delta and lambda planforms. The stall occurs at an angle of attack α=32o.Keywords: aerodynamic, delta wing, PIV, vortex breakdown
Procedia PDF Downloads 4202145 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution
Authors: V. S. S. Kumar, V. Ramya
Abstract:
In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept
Procedia PDF Downloads 4722144 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining
Authors: İbrahi̇m Kara, Seher Arslankaya
Abstract:
Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.Keywords: data mining, decision support systems, heart attack, health sector
Procedia PDF Downloads 3562143 Aerodynamic Coefficients Prediction from Minimum Computation Combinations Using OpenVSP Software
Authors: Marine Segui, Ruxandra Mihaela Botez
Abstract:
OpenVSP is an aerodynamic solver developed by National Aeronautics and Space Administration (NASA) that allows building a reliable model of an aircraft. This software performs an aerodynamic simulation according to the angle of attack of the aircraft makes between the incoming airstream, and its speed. A reliable aerodynamic model of the Cessna Citation X was designed but it required a lot of computation time. As a consequence, a prediction method was established that allowed predicting lift and drag coefficients for all Mach numbers and for all angles of attack, exclusively for stall conditions, from a computation of three angles of attack and only one Mach number. Aerodynamic coefficients given by the prediction method for a Cessna Citation X model were finally compared with aerodynamics coefficients obtained using a complete OpenVSP study.Keywords: aerodynamic, coefficient, cruise, improving, longitudinal, openVSP, solver, time
Procedia PDF Downloads 2352142 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel
Authors: Afif J. Arabi
Abstract:
On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory
Procedia PDF Downloads 442141 A Grey-Box Text Attack Framework Using Explainable AI
Authors: Esther Chiramal, Kelvin Soh Boon Kai
Abstract:
Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.Keywords: BERT, explainable AI, Grey-box text attack, transformer
Procedia PDF Downloads 1372140 A Systematic Review on Assistive Technology Robotics in Lower and Middle-Income Settings
Authors: Sumudu Sameera Perera Kimmantudawage, Chapal Khasnabis
Abstract:
Technology is changing at a rapid rate, with innovations in robotics being hailed and tested in countries such as Japan, the United States and Australia, however the conversation in a public health context is stagnant. While obvious barriers to robotics use in low and middle-income countries and regions exist, the avoidance of attempting to address these regions of the world may potentially lead to an ever-increasing divide between those of high income countries and those of less. A systematic review was undertaken to determine the number of projects involving research, development and testing of robotics considered low and middle-income regions. Major findings indicate that an overwhelmingly significant number of projects failed to consider low and middle-income countries or regions. These results are unsurprising however alarming, as bridging the divide is an important step forward in achieving the UN Sustainable Development Goals by 2030. It is hoped that this research would spawn future robotics research that focusses on lower and middle-income regions.Keywords: assistive technology, health equality, robotics, socioeconomic
Procedia PDF Downloads 2352139 Mediation of the Middle Eastern Crises and Economic Growth: An Application of Times Series Analysis
Authors: Gokhan Erkal, Gulsen Aydin, Muge Yuce, Lokman Sahin
Abstract:
This study aims to analyze the impacts of involving in mediation of conflicts in the Middle East from the perspective of the economic growth of the mediators. The Middle East is a highly volatile region of the world with rampant crises whose affects spill beyond its borders. Therefore, management and resolution of the conflicts in the region are of great significance. Mediation is an instrument used for abating violence and settling dispute. The recourse to mediation has grown to an important degree in recent years. However, for mediators, it is a daunting task to involve in the mediation of the deadlocks in the Middle East. This study tries to shed light on the positive correlation between economic growth of the mediator and the successful outcome of the mediation process to provide motivation for mediators. To this end, first, it briefly introduces the conflicts ongoing in the region and their negative impacts. Second, the methodology, time series analysis, and the data to be used, International Crisis Behavior Project Data, are presented. Third, the empirical test is carried out and the findings are evaluated. The conclusion highlights the benefits of successful mediation for the economic growth of the mediators of Middle Eastern crises.Keywords: international crises, mediation, Middle East, times series analysis
Procedia PDF Downloads 1752138 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 3542137 Design of Middleware for Mobile Group Control in Physical Proximity
Authors: Moon-Tak Oh, Kyung-Min Park, Tae-Eun Yoon, Hoon Choi, Chil-Woo Lee
Abstract:
This paper is about middle-ware which enables group-user applications on mobile devices in physical proximity to interact with other devices without intervention of a central server. Requirements of the middle-ware are identified from service usage scenarios, and the functional architecture of the middle-ware is specified. These requirements include group management, synchronization, and resource management. Group Management needs to provide various capabilities to such applications with respect to managing multiple users (e.g., creation of groups, discovery of group or individual users, member join/leave, election of a group manager and service-group association) using D2D communication technology. We designed the middle-ware for the above requirements on the Android platform.Keywords: group user, middleware, mobile service, physical proximity
Procedia PDF Downloads 5062136 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2692135 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN
Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu
Abstract:
Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.Keywords: DDoS detection, EMD, relative entropy, SDN
Procedia PDF Downloads 3382134 Gloria Naylor's Linden Hills: A Fine Description of Burdens and Misguided Notions of the Middle Black Community
Authors: Kalluru Maheswaramma, Putta Padma
Abstract:
This study makes an attempt to demonstrate the wondrous world of the upwardly middle black community in Gloria Naylor’s Linden Hills. Gloria Naylor’s first novel The Women of Brewster Place is about the working class and Linden Hills about middle-class Black America. Naylor believes their serenity that is lost in the middle or working class black people as they move into the upper patriarchal society. Naylor challenges the different forms of superiority, homophobia, and chauvinism, interracial bias, and the like, which plague a community so significantly trying to be acceptable in the larger white community. In an ironic twist, Naylor creates characters that recognize their desire for a solid black community but who in reality ignore blackness and negate any emergent sign of its development. Linden Hills is an expose of the wealthy and spiritually dissolute upper class. Linden Hills is an examination of an upper-middle-class African American community in which women are largely exploited or invisible and in which men have, in the course of upward mobility, sacrificed their racial identity and their essence. Linden Hills is a social world, which includes firm stratification, false values, and an immobilizing impact on its residents. Touching a brief note upon the origin and development of African American Literature as well a note on the chosen writer and her works, the paper proceeds to depict the middle-class black community of Linden Hills.Keywords: gloria naylor, linden hills, African American community, the middle black community
Procedia PDF Downloads 5642133 The Results of the Research and Documentation of Early Middle Ages Sites in the North-West Poland
Authors: Wojciech Kulesza
Abstract:
The north-western part of the Poland, specifically West Pomerania and Lubuskie provinces, from several years are the subject of research of the Department of Archaeology of Early Middle Ages of Institute of Archaeology of Nicolaus Copernicus University in Toruń. This area has a dense network of rivers and numerous lakes, where many of them are connected to the southern part of the Baltic Sea. During the many years of research in this area, archaeologists discovered the remains of the early Middle Ages settlement located on several islands and in most cases were encountered relics of early Middle Ages bridges linking those islands with the mainland. During the excavation, work was carried out both under water and on land for the accurate identification of islands and adjacent to them underwater areas. The result of this work is a graphic documentation, made in a three-dimensional technique, not only for the underwater trenches but also relics of bridges and objects discovered during exploration, which as the main theme will be presented in the full presentation.Keywords: Poland, underwater archaeology, Nicolaus Copernicus University, early middle ages
Procedia PDF Downloads 2452132 Attack Redirection and Detection using Honeypots
Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat
Abstract:
A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner
Procedia PDF Downloads 1562131 Detecting and Thwarting Interest Flooding Attack in Information Centric Network
Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S
Abstract:
Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy
Procedia PDF Downloads 2052130 Towards a Model of Support in the Areas of Services of Educational Assistance and Mentoring in Middle Education in Mexico
Authors: Margarita Zavala, Gabriel Chavira, José González, Jorge Orozco, Julio Rolón, Roberto Pichardo
Abstract:
Adolescence is a neuralgic stage in the formation of every human being, generally this stage is when the middle school level is studied. In 2006, Mexico incorporated 'mentoring' space to assist students in their integration and participation in life. In public middle schools, it is sometimes difficult to be aware of situations that affect students because of the number of them and traditional records management. With this, they lose the opportunity to provide timely support as a preventive way. In order to provide this support, it is required to know the students by detecting the relevant information that has greater impact on their learning process. This research is looking to check if it is possible to identify student’s relevant information to detect when it is at risk, and then to propose a model to manage in a proper way such information.Keywords: adolescence, mentoring, middle school students, mentoring system support
Procedia PDF Downloads 480