Search results for: sulfuric acid attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3836

Search results for: sulfuric acid attacks

3776 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 182
3775 Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security

Authors: Godiya Atsiya Pius

Abstract:

The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond.

Keywords: insurgency, gender, violence, security, vulnerable groups

Procedia PDF Downloads 445
3774 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution

Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla

Abstract:

The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.

Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad

Procedia PDF Downloads 58
3773 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 60
3772 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 162
3771 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 207
3770 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 62
3769 Allura Red, Sunset Yellow and Amaranth Azo Dyes for Corrosion Inhibition of Mild Steel in 0.5 H₂SO₄ Solutions

Authors: Ashish Kumar Singh, Preeti Tiwari, Shubham Srivastava, Rajiv Prakash, Herman Terryn, Gopal Ji

Abstract:

Corrosion inhibition potential of azo dyes namely Allura red (AR), Sunset Yellow (SY) and Amaranth (AN) have been investigated in 0.5 M H2SO4 solutions by electrochemical impedance spectroscopy (EIS), Tafel polarization curves, linear polarization curves, open circuit potential (ocp) curves, UV-Visible spectroscopy, Fourier Transform Infrared spectroscopy (FTIR) and scanning electron microscopy (SEM) techniques. Amaranth dye is found to provide highest corrosion inhibition (90 %) against mild steel corrosion in sulfuric acid solutions among all the tested dyes; while SY and AR dye shows 80% and 78% corrosion inhibition efficiency respectively. The electrochemical measurements and surface morphology analysis reveal that molecular adsorption of dyes at metal acid interface is accountable for inhibition of mild steel corrosion in H2SO4 solutions. The adsorption behavior of dyes has been investigated by various isotherms models, which verifies that it is in accordance with Langmuir isotherm.

Keywords: mild steel, Azo dye, EIS, Langmuir isotherm

Procedia PDF Downloads 348
3768 Hydrogen Production from Solid Waste of Sago Processing Industries in Indonesia: Effect of Chemical and Biological Pretreatment

Authors: Pratikno Hidayat, Khamdan Cahyari

Abstract:

Hydrogen is the ultimate choice of energy carriers in future. It contents high energy density (42 kJ/g), emits only water vapor during combustion and has high energy conversion up to 50% in fuel cell application. One of the promising methods to produce hydrogen is from organic waste through dark fermentation method. It utilizes sugar-rich organic waste as substrate and hydrogen-producing microorganisms to generate the hydrogen. Solid waste of sago processing industries in Indonesia is one of the promising raw materials for both producing biofuel hydrogen and mitigating the environmental impact due to the waste disposal. This research was meant to investigate the effect of chemical and biological pretreatment i.e. acid treatment and mushroom cultivation toward lignocellulosic waste of these sago industries. Chemical pretreatment was conducted through exposing the waste into acid condition using sulfuric acid (H2SO4) (various molar i.e. 0.2, 0.3, and 0.4 M and various duration of exposure i.e. 30, 60 and 90 minutes). Meanwhile, biological treatment was conducted through utilization of the solid waste as growth media of mushroom (Oyster and Ling-zhi) for 3 months. Dark fermentation was conducted at pH 5.0, temperature 27℃ and atmospheric pressure. It was noticed that chemical and biological pretreatment could improve hydrogen yield with the highest yield at 3.8 ml/g VS (31%v H2). The hydrogen production was successfully performed to generate high percentage of hydrogen, although the yield was still low. This result indicated that the explosion of acid chemical and biological method might need to be extended to improve degradability of the solid waste. However, high percentage of hydrogen was resulted from proper pretreatment of residual sludge of biogas plant to generate hydrogen-producing inoculum.

Keywords: hydrogen, sago waste, chemical, biological, dark fermentation, Indonesia

Procedia PDF Downloads 345
3767 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review

Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi

Abstract:

Phishing poses a significant threat as cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.

Keywords:

Procedia PDF Downloads 4
3766 Study of the Kinetics of Formation of Carboxylic Acids Using Ion Chromatography during Oxidation Induced by Rancimat of the Oleic Acid, Linoleic Acid, Linolenic Acid, and Biodiesel

Authors: Patrícia T. Souza, Marina Ansolin, Eduardo A. C. Batista, Antonio J. A. Meirelles, Matthieu Tubino

Abstract:

Lipid oxidation is a major cause of the deterioration of the quality of the biodiesel, because the waste generated damages the engines. Among the main undesirable effects are the increase of viscosity and acidity, leading to the formation of insoluble gums and sediments which cause the blockage of fuel filters. The auto-oxidation is defined as the spontaneous reaction of atmospheric oxygen with lipids. Unsaturated fatty acids are usually the components affected by such reactions. They are present as free fatty acids, fatty esters and glycerides. To determine the oxidative stability of biodiesels, through the induction period, IP, the Rancimat method is used, which allows continuous monitoring of the induced oxidation process of the samples. During the oxidation of the lipids, volatile organic acids are produced as byproducts, in addition, other byproducts, including alcohols and carbonyl compounds, may be further oxidized to carboxylic acids. By the methodology developed in this work using ion chromatography, IC, analyzing the water contained in the conductimetric vessel, were quantified organic anions of carboxylic acids in samples subjected to oxidation induced by Rancimat. The optimized chromatographic conditions were: eluent water:acetone (80:20 v/v) with 0.5 mM sulfuric acid; flow rate 0.4 mL min-1; injection volume 20 µL; eluent suppressor 20 mM LiCl; analytical curve from 1 to 400 ppm. The samples studied were methyl biodiesel from soybean oil and unsaturated fatty acids standards: oleic, linoleic and linolenic. The induced oxidation kinetics curves were constructed by analyzing the water contained in the conductimetric vessels which were removed, each one, from the Rancimat apparatus at prefixed intervals of time. About 3 g of sample were used under the conditions of 110 °C and air flow rate of 10 L h-1. The water of each conductimetric Rancimat measuring vessel, where the volatile compounds were collected, was filtered through a 0.45 µm filter and analyzed by IC. Through the kinetic data of the formation of the organic anions of carboxylic acids, the formation rates of the same were calculated. The observed order of the rates of formation of the anions was: formate >>> acetate > hexanoate > valerate for the oleic acid; formate > hexanoate > acetate > valerate for the linoleic acid; formate >>> valerate > acetate > propionate > butyrate for the linolenic acid. It is possible to suppose that propionate and butyrate are obtained mainly from linolenic acid and that hexanoate is originated from oleic and linoleic acid. For the methyl biodiesel the order of formation of anions was: formate >>> acetate > valerate > hexanoate > propionate. According to the total rate of formation these anions produced during the induced degradation of the fatty acids can be assigned the order of reactivity: linolenic acid > linoleic acid >>> oleic acid.

Keywords: anions of carboxylic acids, biodiesel, ion chromatography, oxidation

Procedia PDF Downloads 444
3765 Cardioprotective Effect of Oleanolic Acid and Urosolic Acid against Doxorubicin-Induced Cardiotoxicity in Rats

Authors: Sameer N. Goyal, Chandragauda R. Patil

Abstract:

Oleanolic acid (3/3-hydroxy-olea-12-en-28-oic acid) and its isomer, Ursolic acid (38-hydroxy-urs-12-en-28-oic acid) are triterpenoids compounds which exist widely in plant kingdom in the free acid form or as glycosidic triterpenoids saponins. The aim of the study is to evaluate intravenously administered oleanolic acid and ursolic acid in doxorubicin induced cardiotoxicity. Cardiotoxicity was induced in albino wistar rat with single intravenous injection of doxorubicin at dose of 67.75mg/kg i.v for 48 hrs at 12 hrs interval following doxorubicin administration in the same model cardioprotective effect of amifostine (90 mg/kg i.v, single dose prior 30 min before doxorubicin administration) was evaluated as standard treatment. Induction of cardiotoxicity was confirmed by rise in cardiac markers in serum such as CK–MB, LDH and also by electrocardiographically. The doxorubicin treated group significantly increased in QT interval, serum CK-MB, serum LDH, SGOT, SGPT and antioxidant parameter. Both the treatment group showed significant protective effect on Hemodynamic, electrocardiographic, biochemical, and antioxidant parameters. The oleanolic acid showed slight protective effect in histological lesions in doxorubicin induced cardiotoxicity. Hence, the results indicate that Oleanolic acid has more cardioprotective potential than ursolic acid against doxorubicin induced cardiotoxicity in rats.

Keywords: cardioprotection, doxorubicin, oleanolic acid, ursolic acid

Procedia PDF Downloads 499
3764 The Catalytic Properties of PtSn/Al2O3 for Acetic Acid Hydrogenation

Authors: Mingchuan Zhou, Haitao Zhang, Hongfang Ma, Weiyong Ying

Abstract:

Alumina supported platinum and tin catalysts with different loadings of Pt and Sn were prepared and characterized by low temperature N2 adsorption/desorption, H2-temperature programed reduction and CO pulse chemisorption. Pt and Sn below 1% loading were suitable for acetic acid hydrogenation. The best performance over 0.75Pt1Sn/Al2O3 can reach 87.55% conversion of acetic acid and 47.39% selectivity of ethanol. The operating conditions of acetic acid hydrogenation over 1Pt1Sn/Al2O3 were investigated. High reaction temperature can enhance the conversion of acetic acid, but it decreased total selectivity of ethanol and acetyl acetate. High pressure and low weight hourly space velocity were beneficial to both conversion of acetic acid and selectivity to ethanol.

Keywords: acetic acid, hydrogenation, operating condition, PtSn

Procedia PDF Downloads 330
3763 User’s Susceptibility Factors to Malware Attacks: A Systematic Literature Review

Authors: Awad A. Younis, Elise Stronberg, Shifa Noor

Abstract:

Malware attacks due to end-user vulnerabilities have been noticeably increased in the past few years. Investigating the factors that make an end-user vulnerable to those attacks is critical because they can be utilized to set up proactive strategies such as awareness and education to mitigate the impacts of those attacks. Some existing studies investigated demographic, behavioral, and cultural factors that make an end-user susceptible to malware attacks. However, it has been challenging to draw more general conclusions from individual studies due to the varieties in the type of end-users and different types of malware. Therefore, we conducted a systematic literature review (SLR) of the existing research for end-user susceptibility factors to malware attacks. The results showed while some demographic factors are mostly associated with malware infection regardless of the end users' type, age, and gender are not consistent among the same and different types of end-users. Besides, the association of culture and personality factors with malware infection are consistent in most of the selected studies and for all type of end-users. Moreover, malware infection varies based on age, geographic location, and host types. We propose that future studies should carefully take into consideration the type of end-users because different end users may be exposed to different threats or be targeted based on their user domains’ characteristics. Additionally, as different types of malware use different tactics to trick end-users, taking the malware types into consideration is important.

Keywords: cybersecurity, malware, end-users, demographics, personality, culture, systematic literature review

Procedia PDF Downloads 206
3762 Fatty Acid Composition and Therapeutic Effects of Beebread

Authors: Sibel Silici

Abstract:

Palynological spectrum, proximate and fatty acids composition of eight beebread samples obtained from different geographical origins were determined. Beebread moisture contents varied between 11.4-15.9 %, ash 1.9-2.54 %, fat 5.9-11.5 %, and protein between 14.8-24.3 %. To our knowledge, this is the first study investigating fatty acids (FAs) composition of the selected monofloral beebreads. A total of thirty-seven FAs were identified. Of these (9Z, 12Z, 15Z)-octadeca-9, 12, 15-trienoic acid, (9Z, 12Z)-octadeca-9, 12-dienoic acid, hexadecanoic acid, (Z)-octadec-9-enoic acid, (Z)-icos-11-enoic acid and octadecanoic acid were the most abundant in all the samples. Cotton beebread contained the highest level of ω-3 FAs, 41.3 %. Unsaturated/saturated FAs ratios ranged between 1.38 and 2.39 indicating that beebread is a good source of unsaturated FAs. The pollen, proximate and FAs composition of beebread samples of different botanical and geographical origins varied significantly.

Keywords: bee bread, fatty acid composition, proximate composition, pollen analysis

Procedia PDF Downloads 233
3761 Optimization of Diluted Organic Acid Pretreatment on Rice Straw Using Response Surface Methodology

Authors: Rotchanaphan Hengaroonprasan, Malinee Sriariyanun, Prapakorn Tantayotai, Supacharee Roddecha, Kraipat Cheenkachorn

Abstract:

Lignocellolusic material is a substance that is resistant to be degraded by microorganisms or hydrolysis enzymes. To be used as materials for biofuel production, it needs pretreatment process to improve efficiency of hydrolysis. In this work, chemical pretreatments on rice straw using three diluted organic acids, including acetic acid, citric acid, oxalic acid, were optimized. Using Response Surface Methodology (RSM), the effect of three pretreatment parameters, acid concentration, treatment time, and reaction temperature, on pretreatment efficiency were statistically evaluated. The results indicated that dilute oxalic acid pretreatment led to the highest enhancement of enzymatic saccharification by commercial cellulase and yielded sugar up to 10.67 mg/ml when using 5.04% oxalic acid at 137.11 oC for 30.01 min. Compared to other acid pretreatment by acetic acid, citric acid, and hydrochloric acid, the maximum sugar yields are 7.07, 6.30, and 8.53 mg/ml, respectively. Here, it was demonstrated that organic acids can be used for pretreatment of lignocellulosic materials to enhance of hydrolysis process, which could be integrated to other applications for various biorefinery processes.

Keywords: lignocellolusic biomass, pretreatment, organic acid response surface methodology, biorefinery

Procedia PDF Downloads 622
3760 Physico-Chemical, GC-MS Analysis and Cold Saponification of Onion (Allium cepa L) Seed Oil

Authors: A. A Warra, S. Fatima

Abstract:

The experimental investigation revealed that the hexane extract of onion seed oil has acid value, iodine value, peroxide value, saponification value, relative density and refractive index of 0.03±0.01 mgKOH/g, 129.80±0.21 gI2/100g, 3.00± 0.00 meq H2O2 203.00±0.71 mgKOH/g, 0.82±0.01and 1.44±0.00 respectively. The percentage yield was 50.28±0.01%. The colour of the oil was light green. We restricted our GC-MS spectra interpretation to compounds identification, particularly fatty acids and they are identified as palmitic acid, linolelaidic acid, oleic acid, stearic acid, behenic acid, linolenic acid and eicosatetraenoic acid. The pH , foam ability (cm³), total fatty matter, total alkali and percentage chloride of the onion oil soap were 11.03± 0.02, 75.13±0.15 (cm³), 36.66 ± 0.02 %, 0.92 ± 0.02% and 0.53 ± 0.15 % respectively. The texture was soft and the colour was lighter green. The results indicated that the hexane extract of the onion seed oil has potential for cosmetic industries.

Keywords: onion seeds, soxhlet extraction, physicochemical, GC-MS, cold saponification

Procedia PDF Downloads 287
3759 Spectrophotometric Determination of 5-Aminosalicylic Acid in Pharmaceutical Samples

Authors: Chand Pasha

Abstract:

A Simple, accurate and precise spectrophotometric method for the quantitative analysis of determination of 5-aminosalicylic acid is described. This method is based on the reaction of 5-aminosalicylic acid with nitrite in acid medium to form diazonium ion, which is coupled with acetylacetone in basic medium to form azo dyes, which shows absorption maxima at 470 nm. The method obeys Beer’s law in the concentration range of 0.5-11.2 gml-1 of 5-aminosalicylic acid with acetylacetone. The molar absorptivity and Sandell’s sensitivity of 5-aminosalicylic acid -acetylacetone azo dye is 2.672 ×104 lmol-1cm-1, 5.731 × 10-3 gcm-2 respectively. The dye formed is stable for 10 hrs. The optimum reaction conditions and other analytical parameters are evaluated. Interference due to foreign organic compounds have been investigated. The method has been successfully applied to the determination of 5-aminosalicylic acid in pharmaceutical samples.

Keywords: spectrophotometry, diazotization, mesalazine, nitrite, acetylacetone

Procedia PDF Downloads 156
3758 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 374
3757 Lipase-Mediated Formation of Peroxyoctanoic Acid Used in Catalytic Epoxidation of α-Pinene

Authors: N. Wijayati, Kusoro Siadi, Hanny Wijaya, Maggy Thenawijjaja Suhartono

Abstract:

This work describes the lipase-mediated synthesis of α-pinene oxide at ambient temperature. The immobilized lipase from Pseudomonas aeruginosa is used to generate peroxyoctanoic acid directly from octanoic acid and hydrogen peroxide. The peroxy acid formed is then applied for in situ oxidation of α-pinene. High conversion of α-pinene to α-pinene oxide (approximately 78%) was achieved when using 0,1 g enzim lipase, 6 mmol H2O2, dan 5 mmol octanoic acid. Various parameters affecting the conversion of α-pinene to α pinene oxide were studied.

Keywords: α-Pinene; P. aeruginosa; Octanoic acid

Procedia PDF Downloads 248
3756 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 408
3755 Morphology and Mineralogy of Acid Treated Soil

Authors: P. Hari Prasad Reddy, C. H. Rama Vara Prasad, G. Kalyan Kumar

Abstract:

This paper presents the morphological and mineralogical changes occurring in the soil due to immediate and prolonged interaction with different concentrations of phosphoric acid and sulphuric acid. In order to assess the effect of acid contamination, a series of sediment volume, scanning electron microscopy and X-ray diffraction analysis tests were carried out on soil samples were exposed to different concentrations (1N, 4N and 8N) of phosphoric and sulphuric acid. Experimental results show that both acids showed severe morphological and mineralogical changes with synthesis of neogenic formations mainly at higher concentrations (4N and 8N) and at prolonged duration of interaction (28 and 80 days).

Keywords: phosphoric acid, scanning electron microscopy, sulphuric acid, x-ray diffraction analysis

Procedia PDF Downloads 400
3754 Analysis of Kinetin Supramolecular Complex with Glytsirrizinic Acid and Based by Mass-Spectrometry Method

Authors: Bakhtishod Matmuratov, Sakhiba Madraximova, Rakhmat Esanov, Alimjan Matchanov

Abstract:

Studies have been performed to obtain complexes of glycyrrhizic acid and kinetins in a 2:1 ratio. The complex of glycyrrhizic acid and kinetins in a 2:1 ratio was considered evidence of the formation of a molecular complex by determining the molecular masses using chromato-mass spectroscopy and analyzing the IR spectra.

Keywords: monoammonium salt of glycyrrhizic acid, glycyrrhizic acid, supramolecular complex, isomolar series, IR spectroscopy

Procedia PDF Downloads 144
3753 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 387
3752 The Ability of Organic Acids Production by Lactic Acid Bacteria in M17 Broth and Squid, Shrimp, Octopus, Eel Infusion Broth

Authors: Fatih Özogul, Sezen Özçeli̇k, Yesim Özogul

Abstract:

Lactic, acetic, succinic, propionic, formic and butyric acid production by lactic acid bacteria (LAB) were monitored in M17 broth (the control) and some fish (squid, shrimp, octopus, and eel) infusion broth by using HPLC method. There were significant differences in terms of lactic, acetic, succinic, propionic, formic and butyric acid production (p < 0.005) among bacterial strains. Acetic acid production was the lowest by LAB while succinic acid followed by propionic acid was synthesized at the highest levels. Lactic acid production ranged from 0 to 938 mg/L by all LAB strains in different infusion broth. The highest acetic acid production was found by Lb. acidophilus and Lb. delbrueckii subsp. lactic in octopus and shrimp infusion broth, with values of 872 and 674 mg/L, respectively while formic acid formation ranged from 1747 mg/L by Lb. acidophilus in octopus infusion broth to 69 mg/L by Lb. delbrueckii subsp. lactis in shrimp infusion broth. Propionic acid and butyric acid productions by St. thermophilus were 9852 and 3999 mg/L in shrimp infusion broth while Leu. mes. subsp. cremoris synthesized 312 and 9 mg/L of those organic acid in European squid infusion broth, respectively. Apparently, LAB strains had a great capability to generate succinic acid followed by propionic and butyric acid. In addition, other organic acid production differed significantly depending on bacterial strains and growth medium.

Keywords: Lactic acid bacteria , organic acid, HPLC analysis, growth medium

Procedia PDF Downloads 351
3751 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 142
3750 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 48
3749 Fractionation of Biosynthetic Mixture of Gentamicins by Reactive Extraction

Authors: L. Kloetzer, M. Poştaru, A. I. Galaction, D. Caşcaval

Abstract:

Gentamicin is an aminoglycoside antibiotic industrially obtained by biosynthesis of Micromonospora purpurea or echinospora, the product being a complex mixture of components with very similar structures. Among them, three exhibit the most important biological activity: gentamicins C1, C1a, C2, and C2a. The separation of gentamicin from the fermentation broths at industrial scale is rather difficult and it does not allow the fractionation of the complex mixture of gentamicins in order to increase the therapeutic activity of the product. The aim of our experiments is to analyze the possibility to selectively separate the less active gentamicin, namely gentamicin C1, from the biosynthetic mixture by reactive extraction with di-(2-ethylhexyl) phosphoric acid (D2EHPA) dissolved in dichloromethane, followed selective re-extraction of the most active gentamicins C1a, C2, and C2a. The experiments on the reactive extraction of gentamicins indicated the possibility to separate selectively the gentamicin C1 from the mixture obtained by biosynthesis. The extraction selectivity is positively influenced by increasing the pH-value of an aqueous solution and by using a D2EHPA concentration in organic phase closer to the value needed for an equimolecular ratio between the extractant and this gentamicin. For quantifying the selectivity of separation, the selectivity factor, calculated as the ratio between the degree of reactive extraction of gentamicin C1 and the overall extraction degree of gentamicins were used. The possibility to remove the gentamicin C1 at an extractant concentration of 10 g l-1 and pH = 8 is presented. In these conditions, it was obtained the maximum value of the selectivity factor of 2.14, which corresponds to the modification of the gentamicin C1 concentration from 31.92% in the biosynthetic mixture to 72% in the extract. The re-extraction of gentamicins C1, C1a, C2, and C2a with sulfuric acid from the extract previously obtained by reactive extraction (mixture A – extract obtained by non-selective reactive extraction; mixture B – extract obtained by selective reactive extraction) allows for separating selectively the most active gentamicins C1a, C2, and C2a. For recovering only the active gentamicins C1a, C2, and C2a, the re-extraction must be carried out at very low acid concentrations, far below those corresponding to the stoichiometry of its chemical reactions with these gentamicins. Therefore, the mixture resulted by re-extraction contained 92.6% gentamicins C1a, C2, and C2a. By bringing together the aqueous solutions obtained by reactive extraction and re-extraction, the overall content of the active gentamicins in the final product becomes 89%, their loss reaching 0.3% related to the initial biosynthetic product.

Keywords: di-(2-ethylhexyl) phosphoric acid, gentamicin, reactive extraction, selectivity factor

Procedia PDF Downloads 291
3748 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm

Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi

Abstract:

The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.

Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt

Procedia PDF Downloads 208
3747 Microwave Assisted Extraction (MAE) of Castor Oil from Castor Bean

Authors: Ghazi Faisal Najmuldeen, Rosli Mohd Yunus, Nurfarahin Bt Harun, Mardhiana Binti Ismail

Abstract:

The microwave extraction has attracted great interest among the researchers. The main virtue of the microwave technique is cost-effective, time saving and simple handling procedure. Castor beans was chosen because of its high content in fatty acid, especially ricinoleic acid. The purpose of this research is to extract the castor oil by using the microwave assisted extraction (MAE) using ethanol as solvent and to investigate the influence of extraction time on castor oil yield and to characterize the main composition of the produced castor oil by using the GC-MS. It was found that there is a direct dependence between the oil yield and the time of extraction as it increases from 45% to 58% as the time increase from 10 min to 60 min. The major components of castor oil detected by GC-MS were ricinoleic acid, linoleic acid and oleic acid.

Keywords: microwave assisted extraction (MAE), castor oil, ricinoleic acid, linoleic acid

Procedia PDF Downloads 481