Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1302

Search results for: salt and peppers attacks

1242 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 95
1241 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 195
1240 Bio-Genetic Activities Associated with Resistant in Peppers to Phytophthora capsici

Authors: Mehdi Nasr-Esfahani, Leila Mohammad Bagheri, Ava Nasr-Esfahani

Abstract:

Root and collar rot disease caused by Phytophthora capsici (Leonian) is one of the most serious diseases in pepper, Capsicum annuum L. In this study, a diverse collection of 37 commercial edible and ornamental pepper genotypes infected with P. capsici were investigated for biomass parameters and enzymatic activity of peroxidase or peroxide reductases (EC), superoxide dismutase (SOD), polyphenol oxidase (PPOs), catalase (CAT) and phenylalanine ammonia-lyase (PAL). Seven candidate DEG genes were also evaluated on resistant and susceptible pepper cultivars, through measuring product formation, using spectrophotometry and real-time polymerase chain reaction. All the five enzymes and seven defense-gene candidates were up-regulated in all inoculated pepper accessions to P. capsici. But, the enzymes and DEG genes were highly expressed in resistant cv. 19OrnP-PBI, 37ChillP-Paleo, and “23CherryP-Orsh". The expression level of enzymes were 1.5 to 5.6-fold higher in the resistant peppers, than the control non-inoculated genotypes. Also, the transcriptional levels of related candidate DEG genes were 3.16 to 5.90-fold higher in the resistant genotypes. There was a direct and high correlation coefficient between resistance, bio-mass parameters, enzymatic activity, and resistance gene expression. The related enzymes and candidate genes expressed herein will provide a basis for further gene cloning and functional verification studies, and also will aid in an understanding of the regulatory mechanism of pepper resistance to P. capsici.

Keywords: AP2/ERF, cDNA, enzymes, MIP gene, q-RTPCR, XLOC

Procedia PDF Downloads 152
1239 Dilution of Saline Irrigation Based on Plant's Physiological Responses to Salt Stress Following by Re-Watering

Authors: Qaiser Javed, Ahmad Azeem

Abstract:

Salinity and water scarcity are major environmental problems which are limiting the agricultural production. This research was conducted to construct a model to find out appropriate regime to dilute saline water based on physiological and electrophysiological properties of Brassica napus L., and Orychophragmus violaceus (L.). Plants were treated under salt-stressed concentrations of NaCl (NL₁: 2.5, NL₂: 5, NL₃: 10; gL⁻¹), Na₂SO₄ (NO₁: 2.5, NO₂: 5, NO₃: 10; gL⁻¹), and mixed salt concentration (MX₁: NL₁+ NO₃; MX₂: NL₃+ NO₁; MX₃: NL₂+ NO₂; gL⁻¹) and 0 as control, followed by re-watering. Growth, physiological and electrophysiology traits were highly restricted under high salt concentration levels at NL₃, NO₃, MX₁, and MX₂, respectively. However, during the rewatering phase, growth, electrophysiological, and physiological parameters were recovered well. Consequently, the increase in net photosynthetic rate was noted under moderate stress condition which was 44.13, 37.07, and 43.01%, respectively in Orychophragmus violaceus (L.) and 44.94%, 53.45%, and 63.04%, respectively were found in Brassica napus L. According to the results, the best dilution point was 5–2.5% for NaCl and Na₂SO₄ alternatively, whereas it was 10–0.0% for the mixture of salts. Therefore, the effect of salinity in O. violaceus and B. napus may also be reduced effectively by dilution of saline irrigation. It would be a better approach to utilize dilute saline water for irrigation instead of applies direct saline water to plant. This study provides new insight in the field of agricultural engineering to plan irrigation scheduling considering the crop ability to salt tolerance and irrigation water use efficiency by apply specific quantity of irrigation calculated based on the salt dilution point. It would be helpful to balance between irrigation amount and optimum crop water consumption in salt-affected regions and to utilize saline water in order to safe freshwater resources.

Keywords: dilution model, plant growth traits, re-watering, salt stress

Procedia PDF Downloads 159
1238 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 234
1237 Ageing Deterioration of High-Density Polyethylene Cable Spacer under Salt Water Dip Wheel Test

Authors: P. Kaewchanthuek, R. Rawonghad, B. Marungsri

Abstract:

This paper presents the experimental results of high-density polyethylene cable spacers for 22 kV distribution systems under salt water dip wheel test based on IEC 62217. The strength of anti-tracking and anti-erosion of cable spacer surface was studied in this study. During the test, dry band arc and corona discharge were observed on cable spacer surface. After 30,000 cycles of salt water dip wheel test, obviously surface erosion and tracking were observed especially on the ground end. Chemical analysis results by fourier transforms infrared spectroscopy showed chemical changed from oxidation and carbonization reaction on tested cable spacer. Increasing of C=O and C=C bonds confirmed occurrence of these reactions.

Keywords: cable spacer, HDPE, ageing of cable spacer, salt water dip wheel test

Procedia PDF Downloads 379
1236 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 98
1235 Salt-Induced Modulation in Biomass Production, Pigment Concentration, Ion Accumulation, Antioxidant System and Yield in Pea Plant

Authors: S. Noreen, S. Ahmad

Abstract:

Salinity is one of the most important environmental factors that limit the production of crop plants to the greatest proportion than any other ones. Salt-induced changes in growth, pigment concentration, water status, malondialdehydes (MDA) and H₂O₂ content, enzymatic and non-enzymatic antioxidants, Na⁺, K⁺ content and yield attributes were examined in the glasshouse on ten pea (Pisum Sativum L.) accessions, namely ‘13240’, ‘18302’, ‘19666’, ‘19700’, ‘19776’, ‘19785’, ‘19788’, ‘20153’, ‘20155’, ‘26719’ were subjected to non-stress (0 mM NaCl) and salt stress (100 mM and150 mM NaCl) in pots containing sand medium. The results showed that salt stress at level150 mM substantially reduced biomass production, leaf water status, pigment concentration (chlorophyll ‘a’, ‘b’, ‘carotenoid content’ total chlorophyll), K⁺ content, quantum yield and yield attributes as compared to plants treated with 100 mM NaCl. Antioxidant enzymes, Catalase (CAT), Peroxidase (POD), Superoxide dismutase (SOD) and Ascorbate peroxidase (APX), proline content, total soluble protein, total amino acids, Malondialdehyde content (MDA), Hydrogen peroxide (H₂O₂) content and Na⁺ uptake markedly enhanced due to the influence of salt stress. On the basis of analyses (expressed as percent of control), of 10 accessions of pea plant, two were ranked as salt tolerant namely (‘19666’, ‘20153’), four were moderately tolerant namely (‘19700’, ‘19776’, ‘19785’, ‘20155’), and three were salt sensitive namely (‘13240’, ‘18302’, ‘26719’) at 150 mM NaCl level.

Keywords: antioxidant enzymes, ion uptake, pigment concentration, salt stress, yield attributes

Procedia PDF Downloads 107
1234 Quantitative Evaluation of Endogenous Reference Genes for ddPCR under Salt Stress Using a Moderate Halophile

Authors: Qinghua Xing, Noha M. Mesbah, Haisheng Wang, Jun Li, Baisuo Zhao

Abstract:

Droplet digital PCR (ddPCR) is being increasingly adopted for gene detection and quantification because of its higher sensitivity and specificity. According to previous observations and our lab data, it is essential to use endogenous reference genes (RGs) when investigating gene expression at the mRNA level under salt stress. This study aimed to select and validate suitable RGs for gene expression under salt stress using ddPCR. Six candidate RGs were selected based on the tandem mass tag (TMT)-labeled quantitative proteomics of Alkalicoccus halolimnae at four salinities. The expression stability of these candidate genes was evaluated using statistical algorithms (geNorm, NormFinder, BestKeeper and RefFinder). There was a small fluctuation in cycle threshold (Ct) value and copy number of the pdp gene. Its expression stability was ranked in the vanguard of all algorithms, and was the most suitable RG for quantification of expression by both qPCR and ddPCR of A. halolimnae under salt stress. Single RG pdp and RG combinations were used to normalize the expression of ectA, ectB, ectC, and ectD under four salinities. The present study constitutes the first systematic analysis of endogenous RG selection for halophiles responding to salt stress. This work provides a valuable theory and an approach reference of internal control identification for ddPCR-based stress response models.

Keywords: endogenous reference gene, salt stress, ddPCR, RT-qPCR, Alkalicoccus halolimnae

Procedia PDF Downloads 104
1233 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments

Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem

Abstract:

The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).

Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar

Procedia PDF Downloads 235
1232 Hydrogen Storage in Salt Caverns: Rock Mechanical Design

Authors: Dirk Zapf, Bastian Leuger

Abstract:

For several years, natural gas and crude oil have been stored in salt caverns in Germany and also worldwide. The dimensioning concepts have been continuously developed from a rock mechanics point of view. In addition to the possibilities of realizing large numerical calculation models based on real survey data nowadays, especially the consideration of mechanical processes such as damage and healing played a role in the development of adequate material laws. In addition, thermodynamic aspects have had to be considered for some years in the operation of a gas storage cavern since temperature changes have a significant influence on the stress states in the vicinity of a storage cavern. The possibility of thermally induced fracturing processes is also investigated in the context of rock mechanics dimensioning. In recent years, the energy crisis and the finite nature of fossil fuel use have led to increased discussion of the use of salt caverns for hydrogen storage. In this paper, state of the art is presented, the current research work is described, and an outlook is given as to which questions still need to be answered from a rock mechanics point of view in connection with large-scale storage of hydrogen in salt caverns.

Keywords: cavern design, hydrogen, rock salt, thermomechanical coupled calculations

Procedia PDF Downloads 121
1231 Deep Reinforcement Learning and Generative Adversarial Networks Approach to Thwart Intrusions and Adversarial Attacks

Authors: Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica F. Nelson, Sachin S. Shetty

Abstract:

Malicious users exploit vulnerabilities in computer systems, significantly disrupting their performance and revealing the inadequacies of existing protective solutions. Even machine learning-based approaches, designed to ensure reliability, can be compromised by adversarial attacks that undermine their robustness. This paper addresses two critical aspects of enhancing model reliability. First, we focus on improving model performance and robustness against adversarial threats. To achieve this, we propose a strategy by harnessing deep reinforcement learning. Second, we introduce an approach leveraging generative adversarial networks to counter adversarial attacks effectively. Our results demonstrate substantial improvements over previous works in the literature, with classifiers exhibiting enhanced accuracy in classification tasks, even in the presence of adversarial perturbations. These findings underscore the efficacy of the proposed model in mitigating intrusions and adversarial attacks within the machine learning landscape.

Keywords: machine learning, reliability, adversarial attacks, deep-reinforcement learning, robustness

Procedia PDF Downloads 9
1230 Development of a Steam or Microwave-Assisted Sequential Salt-Alkali Pretreatment for Sugarcane Leaf Waste

Authors: Preshanthan Moodley

Abstract:

This study compares two different pretreatments for sugarcane leaf waste (SLW): steam salt-alkali (SSA) and microwave salt-alkali (MSA). The two pretreatment types were modelled, optimized, and validated with R² > 0.97. Reducing sugar yields of 1.21g/g were obtained with optimized SSA pretreatment using 1.73M ZnCl₂, 1.36M NaOH and 9.69% solid loading, and 1.17g/g with optimized MSA pretreatment using 1.67M ZnCl₂, 1.52M NaOH at 400W for 10min. A lower pretreatment time (10min) was required for the MSA model (83% lower). The structure of pretreated SLW was assessed using scanning electron microscopy (SEM) and Fourier Transform Infrared analysis (FTIR). The optimized SSA and MSA models showed lignin removal of 80.5 and 73% respectively. The MSA pretreatment was further examined on sorghum leaves and Napier grass and showed yield improvements of 1.9- and 2.8-fold compared to recent reports. The developed pretreatment methods demonstrated high efficiency at enhancing enzymatic hydrolysis on various lignocellulosic substrates.

Keywords: lignocellulosic biomass, pretreatment, salt, sugarcane leaves

Procedia PDF Downloads 264
1229 Screening Some Accessions of Lentil (Lens culinaris M.) for Salt Tolerance at Germination and Early Seedling Stage in Eastern Ethiopia

Authors: Azene Tesfaye, Yohannes Petros, Habtamu Zeleke

Abstract:

To evaluate genetic variation among Ethiopian lentil, laboratory experiment were conducted to screen 12 accessions of lentil (Lens culinaris M.) for salt tolerance. Seeds of 12 Lentil accessions were grown at laboratory (Petri dish) condition with different levels of salinity (0, 2, 4, and 8 dSm-1 NaCl) for 4 weeks. The experimental design was completely randomized design (CRD) in factorial combination with three replications. Data analysis was carried out using SAS software. Average germination time, germination percentage, seedling shoot and root traits, seedling shoot and root weight were evaluated. The two way ANOVA for varieties revealed statistically significant variation among lentil accession, NaCl level and their interactions (p<0.001) with respect to the entire parameters. It was found that salt stress significantly delays germination rate and decreases germination percentage, shoot and root length, seedling shoot and root weight of lentil accessions. The degree of decrement varied with accessions and salinity levels. Accessions 36120, 9235 and 36004 were better salt tolerant than the other accessions. As the result, it is recommended to be used as a genetic resource for the development of lentil accession and other very salt sensitive crop with improved germination under salt stress condition.

Keywords: accession, germination, lentil, NaCl, screening, seedling stage

Procedia PDF Downloads 339
1228 Potato Production under Brakish Water and Compost Use

Authors: Samih Abubaker, Amjad Abuserhan, Ghandi Anfoka

Abstract:

Potato yield reduction and soil salt accumulation are the main obstacles of using brackish water in irrigation. This study was carried out at Al- Balqa` Applied University research station, to investigate the impact of compost use on potato production and salt accumulation in the soil under brackish water, during 2014 growing season. Whole tubers of three imported potato cultivars (Spunta, Faluka and Ammbetion) were planted in pots with different soil and compost percentages (0, 20, 40, 60, 80, and 100%) and were irrigated with three water salinity levels (1.25, 5 and 10 ds/cm). A split-split plot design was used, where potato cultivars were arranged in the main plots, the brackish water treatments were in the sub-main and the soil amended treatments were in the sub-sub plots. Potato yield was generally decreased only when pots were irrigated by water of 10 ds/cm salinity compared with 1.25 and 5 ds/cm. Drainage water salinity, however, was increased as compost percentage increased. Nevertheless, salt accumulation in the growing media was decreased as the compost percentage level increased. Therefore, it can be concluded that brackish water, up to 5 ds/cm can be used to irrigate potato especially, when organic amendments were added to the soil to promote plant growth, yield and reduce salt accumulation.

Keywords: brackish water, compost, potato, salt accumulation

Procedia PDF Downloads 321
1227 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 230
1226 Investigate the Movement of Salt-Wedge at Co Chien Estuary, Vietnam in the Context of Climate Change and Reduce Upstream Flow Using 3D Model

Authors: Hieu Duy Nguyen, Chitsan Lin Jr., Dung Duc Tran

Abstract:

Nowadays, drought and salinity intrusion becomes a severe problem in the Lower Mekong region due to climate change, especially in coastal provinces. Freshwater resources are decreased due to sea-level rise and the decline in water flow from upstream in the dry season. The combination of the above issues can lead to many effects on the environment and human health in affected areas such as the pathological of digestive or decreased the immune system. Tidal cycle and upstream flows are the two main factors affecting the saline intrusion process and the former salt-wedge in the estuary. Under suitable conditions, salt-wedge can be going further upstream under the water surface and affected groundwater. In order to have a proper plan for the mitigation of the above adverse effects, we need to understand the characteristics of this process. In this study, 3D model is used to investigate the movement of salt-wedge under different conditions of tidal and flow discharge. The salinity in the vertical profile is also measured in the dry season of 2017 and 2018 for model calibrating. The data has proved that there is the presence of salt-wedge in the study area. The obtained results will help strategic planners to use and preserve water resources more effectively and serve as a basis for new research directions on saline intrusion and human health.

Keywords: salt-wedge, salinity intrusion, human health, 3D model

Procedia PDF Downloads 114
1225 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 404
1224 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 430
1223 Empirical Analysis of the Global Impact of Cybercrime Laws on Cyber Attacks and Malware Types

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study focused on probing the effectiveness of online consumer privacy and protection laws, electronic transaction laws, privacy and data protection laws, and cybercrime legislation amid frequent cyber-attacks and malware types worldwide. An empirical analysis was engaged to uncover ties and causations between the stringency and implementation of these legal structures and the prevalence of cyber threats. A deliberate sample of seventy-eight countries (thirteen countries each from six continents) was chosen as sample size to study the challenges linked with trending regulations and possible panoramas for improving cybersecurity through refined legal approaches. Findings establish if the frequency of cyber-attacks and malware types vary significantly. Also, the result proved that various cybercrime laws differ statistically, and electronic transactions law does not statistically impact the frequency of cyber-attacks. The result also statistically revealed that the online Consumer Privacy and Protection law does not influence the total number of cyber-attacks. In addition, the results implied that Privacy and Data Protection laws do not statistically impact the total number of cyber-attacks worldwide. The calculated value also proved that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the computed value concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Suggestions were produced based on findings from the study, contributing to the ongoing debate on the validity of legal approaches in battling cybercrime and shielding consumers in the digital age.

Keywords: cybercrime legislation, cyber attacks, consumer privacy and protection law, detection, electronic transaction law, prevention, privacy and data protection law, prohibition, prosecution

Procedia PDF Downloads 42
1222 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 418
1221 Salt Stress Affects Growth, Nutrition and Anatomy of Stipa lagascae: A Psammophile Grass in Southern Tunisia

Authors: Raoudha Abdellaoui, Faycal Boughalleb, Zohra Chebil

Abstract:

In arid and semi-arid regions, salinity represents a major constraint towards plants’ growth. Stipa lagascae, a psammophile grass, is a promised species since its economic and ecological interests. Our study aims to explore the effects of different salt concentrations (0; 100; 200; 300 and 400 mM) on physiological, biochemical and anatomic parameters. Salt stress was applied on S. lagascae plants cultivated under controlled conditions. Results show that salinity reduces biomass production especially when plants are subjected to severe stress (>200 mM NaCl). Concerning the nutritional level, the fact of enriching soil with NaCl, leads to an accumulation of Na+ against other nutritional elements (K+, Ca2+). To maintain tissues hydration, S. lagascae established osmotic adaptation by accumulation of proline and soluble sugars. Salt stress affected significantly root and foliar anatomy. Indeed, plants increased their vessels’ diameter and mesophyll surface. S. lagascae plants reduced also the surface of the belluforme cells to defeat dehydration. According to our results, S. lagascae seems to be a tolerant plant at acceptable concentrations that do not exceed 6g/l.

Keywords: anatomical adaptations, mineral nutrition, plant growth, salt stress, stipa lagascae

Procedia PDF Downloads 265
1220 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 172
1219 Microwave-Assisted Inorganic Salt Pretreatment of Sugarcane Leaf Waste

Authors: Preshanthan Moodley, E. B. Gueguim-Kana

Abstract:

The objective of this study was to develop a method to pretreat sugarcane leaf waste using microwave-assisted (MA) inorganic salt. The effects of process parameters of salt concentration, microwave power intensity and pretreatment time on reducing sugar yield from enzymatically hydrolysed sugarcane leaf waste were investigated. Pretreatment models based on MA-NaCl, MA-ZnCl2 and MA-FeCl3 were developed. Maximum reducing sugar yield of 0.406 g/g was obtained with 2 M FeCl3 at 700W for 3.5 min. Scanning electron microscopy (SEM) and Fourier Transform Infrared analysis (FTIR) showed major changes in lignocellulosic structure after MA-FeCl3 pretreatment with 71.5 % hemicellulose solubilization. This pretreatment was further assessed on sorghum leaves and Napier grass under optimal MA-FeCl3 conditions. A 2 fold and 3.1-fold increase in sugar yield respectively were observed compared to previous reports. This pretreatment was highly effective for enhancing enzymatic saccharification of lignocellulosic biomass.

Keywords: acid, pretreatment, salt, sugarcane leaves

Procedia PDF Downloads 453
1218 Basin Geometry and Salt Structures in the Knana/Ragoubet Mahjbia Ranges, North of Tunisia

Authors: Mohamed Montassar Ben Slama, Mohamed Fadel Ladeb, Mohamed Ghanmi, Mohamed Ben Youssef, Fouad Zargouni

Abstract:

The salt province Basin in Northern Tunisia is a complex of late Triassic to Early Cretaceous rift and sag basins which was inverted during the Tertiary folding. The deposition of evaporitic sediments during the Late Triassic times played a major role in the subsequent tectonic evolution of the basin. Within southern tethyan passive marge, the ductile salt mass shown early mobilization, vertical transport and withdrawal of the evaporites. These movements influenced the sedimentation during the late Jurassic and Early Cretaceous. The evaporites also influenced deformation during the inversion of the basin and the development of the Tertiary and Quaternary folding. In the studied area, the biostratigraphic and tectonic map analysis of the region of Jebel el Asoued / Ragoubet el Mahjbia can resolve between the hypotheses of the diapiric intrusion of the Triassic salt and the lateral spreading of the Triassic salt as salt ‘glacier’. Also the variation in thickness and facies of the Aptian sediments demonstrates the existence of continental rise architecture at the Aptian time. The observation in a mappable outcrop of the extension segment of the graben fault of Bou Arada on the one hand confirms the existence of a Cretaceous extensive architecture and the tectonic inversion during the Tertiary time has not filled the main game distension. The extent of our observations of Triassic/Aptian and Triassic/Early Campanian contacts, we propose a composite salt ‘glacier’ model as the structures recorded in the Gulf of Mexico in the subsurface and in the Ouenza east Algeria and in Tunisia within Fedj el Adoum, Touiref-Nebeur and Jebel Ech Cheid in the outcrops.

Keywords: Cretaceous rift, salt ‘glassier’, tertiary folding, Tunisia

Procedia PDF Downloads 381
1217 The Hypoglycaemic and Antioxidant Effects of Ethanolic Extract of Curcuma Longa Rhizomes Alone and with Two Pepper Adjuvants in Alloxan-Induced Diabetic Rats

Authors: J. O. Ezekwesili-Ofili, L. I. Okorafor, S. C. Nsofor

Abstract:

Diabetes mellitus is a carbohydrate metabolism disorder due to an absolute or relative deficiency of insulin secretion, action or both. Many known hypoglycaemic drugs are known to produce serious side effects. However, the search for safer and more effective agents has shifted to plant products, including foods and spices. One of such is the rhizome of Curcuma longa or turmeric, which is a spice with high medicinal value. A drawback in the use of C. longa is the poor bioavailability of curcumin, the active ingredient. It has been reported that piperine, an alkaloid present in peppers increases the bioavailability of curcumin. This work therefore investigated the hypoglycaemic and antioxidant effects of ethanolic extract of C. longa rhizomes, alone and with two pepper adjuvants in alloxan-induced diabetic rats. A total of 48 rats were divided into 6 groups of 8 rats each. Groups A–E were induced with diabetes using 150mg/kg body weight of alloxan monohydrate, while group F was normoglycaemic: Group A: Diabetic; fed with 400 mg/g body weight of turmeric extract; group B: Diabetic, fed with 400 mg/kg b. w. and 200mg/kg b. w of ethanolic extract of seeds of Piper guinensee; group C: Diabetic, fed with 400 mg/kg b. w. and 200 mg /kg b. w. of ethanolic extract of seeds of Capsicum annum var cameroun, group D: Diabetic, treated with standard drug, glibenclamide (0.3mg/kg body weight), group E: Diabetic; no treatment i.e. Positive control and group F: non diabetic, no treatment i.e. Negative control. Blood glucose levels were monitored for 14 days using a glucometer. The levels of the antioxidant enzymes; glutathione peroxidase, catalase and superoxide dismutase were also assayed in serum. The ethanolic extracts of C. longa rhizomes at the dose given (400 mg/kg b. w) significantly reduced the blood glucose levels of the diabetic rats (p<0.05) comparable to the standard drug. Co administration of extract of the peppers did not significantly increase the efficiency of the extract, although C. annum var cameroun showed greater effect, though not significantly. The antioxidant effect of the extract was significant in diabetic rats. The use of piperine-containing peppers enhanced the antioxidant effect. Phytochemical analyses of the ethanolic extract of C. longa showed the presence of alkaloids, flavonoids, steroids, saponins, tannins, glycosides, and terpenoids. These results suggest that the ethanolic extract of C. longa had antidiabetic with antioxidant effects and could thus be of benefit in the treatment and management of diabetes as well as ameliorate pro-oxidant effects that may lead to diabetic complications. However, while the addition of piperine did not affect the antidiabetic effect of C. longa, the antioxidant effect was greatly enhanced.

Keywords: antioxidant, Curcuma longa rhizome, hypoglycaemic, pepper adjuvants, piperine

Procedia PDF Downloads 236
1216 On the Qarat Kibrit Salt Dome Faulting System South of Adam, Oman: In Search of Uranium Anomalies

Authors: Alaeddin Ebrahimi, Narasimman Sundararajan, Bernhard Pracejus

Abstract:

Development of salt domes, often a rising from depths of some 10 km or more, causes an intense faulting of the surrounding host rocks (salt tectonics). The fractured rocks then present ideal space for oil that can migrate and get trapped. If such moving of hydrocarbons passes uranium-carrying rock units (e.g., shales), uranium is collected and enriched by organic carbon compounds. Brines from the salt body are also ideal carriers for oxidized uranium species and will further dislocate uranium when in contact with uranium-enriched oils. Uranium then has the potential to mineralize in the vicinity of the dome (blue halite is evidence for radiation having affected salt deposits elsewhere in the world). Based on this knowledge, the Qarat Kibrit salt dome was investigated by a well-established geophysical method like very low frequency electromagnetic (VLF-EM) along five traverses approximately 250 m in length (10 m intervals) in order to identify subsurface fault systems. In-phase and quadrature components of the VLF-EM signal were recorded at two different transmitter frequencies (24.0 and 24.9 kHz). The images of Fraser filtered response of the in-phase components indicate a conductive zone (fault) in the southeast and southwest of the study area. The Karous-Hjelt current density pseudo section delineates subsurface faults at depths between 10 and 40 m. The stacked profiles of the Fraser filtered responses brought out two plausible trends/directions of faults. However, there seems to be no evidence for uranium enrichment has been recorded in this area.

Keywords: salt dome, uranium, fault, in-phase component, quadrature component, Fraser filter, Karous-Hjelt current density

Procedia PDF Downloads 240
1215 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 80
1214 Biostimulant Activity of Chitooligomers: Effect of Different Degrees of Acetylation and Polymerization on Wheat Seedlings under Salt Stress

Authors: Xiaoqian Zhang, Ping Zou, Pengcheng Li

Abstract:

Salt stress is one of the most serious abiotic stresses, and it can lead to the reduction of agricultural productivity. High salt concentration makes it more difficult for roots to absorb water and disturbs the homeostasis of cellular ions resulting in osmotic stress, ion toxicity and generation of reactive oxygen species (ROS). Compared with the normal physiological conditions, salt stress could inhibit the photosynthesis, break metabolic balance and damage cellular structures, and ultimately results in the reduction of crop yield. Therefore it is vital to develop practical methods for improving the salt tolerance of plants. Chitooligomers (COS) is partially depolymerized products of chitosan, which is consisted of D-glucosamine and N-acetyl-D-glucosamine. In agriculture, COS has the ability to promote plant growth and induce plant innate immunity. The bioactivity of COS closely related to its degree of polymerization (DP) and acetylation (DA). However, most of the previous reports fail to mention the function of COS with different DP and DAs in improving the capacity of plants against salt stress. Accordingly, in this study, chitooligomers (COS) with different degrees of DAs were used to test wheat seedlings response to salt stress. In addition, the determined degrees of polymerization (DPs) COS(DP 4-12) and a heterogeneous COS mixture were applied to explore the relationship between the DP of COSs and its effect on the growth of wheat seedlings in response to salt stress. It showed that COSs, the exogenous elicitor, could promote the growth of wheat seedling, reduce the malondialdehyde (MDA) concentration, and increase the activities of antioxidant enzymes. The results of mRNA expression level test for salt stress-responsive genes indicated that COS keep plants away from being hurt by the salt stress via the regulation of the concentration and the increased antioxidant enzymes activities. Moreover, it was found that the activities of COS was closely related to its Das and COS (DA: 50%) displayed the best salt resistance activity to wheat seedlings. The results also showed that COS with different DP could promote the growth of wheat seedlings under salt stress. COS with a DP (6-8) showed better activities than the other tested samples, implied its activity had a close relationship with its DP. After treatment with chitohexaose, chitoheptaose, and chitooctaose, the photosynthetic parameters were improved obviously. The soluble sugar and proline contents were improved by 26.7%-53.3% and 43.6.0%-70.2%, respectively, while the concentration of malondialdehyde (MDA) was reduced by 36.8% - 49.6%. In addition, the antioxidant enzymes activities were clearly activated. At the molecular level, the results revealed that they could obviously induce the expression of Na+/H+ antiporter genes. In general, these results were fundamental to the study of action mechanism of COS on promoting plant growth under salt stress and the preparation of plant growth regulator.

Keywords: chitooligomers (COS), degree of polymerization (DP), degree of acetylation (DA), salt stress

Procedia PDF Downloads 175
1213 Milk Production and Milk Composition of Dairy Cows in Response to Calcium Salt of Palm Oil Fatty Acids Supplementation

Authors: Wisitiporn Suksombat, Tanawat Phonkert, Chayapol Meeprom

Abstract:

The aim of this experiment was to investigate the effect of calcium salt of palm oil fatty acids (Ca-POFA) supplementation on milk production and milk composition of dairy cows. Twenty-four early lactating crossbred Holstein Friesian 87.5% cows (15.4 ± 3.75 kg of milk/d; 93 ± 27 DIM; 369 ± 6 kg of BW), were assigned into 3 treatments in an RCBD. All dairy cows were fed 15.4% CP total mixed ration (TMR). The first group (control) received a basal diet and no supplement. The second group was fed the basal diet supplemented with 150 g/d calcium salt of palm oil fatty acids (Ca-POFA), and the last group was fed the basal diet supplemented with 300 g/d Ca-POFA. The experiment lasted 40 days with the first 10 days is an adaptation period, and measurements were made during the last 30 days in 6 periods with 5-days in each period for milk sample collection. The results found that supplemented calcium salt of palm oil fatty acid had no effect on milk yield, milk composition, milk composition yield, live weight and live weight change. However, Ca-POFA decreased milk protein percentage (P < 0.05).

Keywords: calcium salt of palm oil fatty acid, dairy cow, milk composition, milk production

Procedia PDF Downloads 225