Search results for: pilot contamination attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2303

Search results for: pilot contamination attacks

2213 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 352
2212 Ecological Risk Assessment of Informal E-Waste Processing in Alaba International Market, Lagos, Nigeria

Authors: A. A. Adebayo, O. Osibanjo

Abstract:

Informal electronic waste (e-waste) processing is a crude method of recycling, which is on the increase in Nigeria. The release of hazardous substances such as heavy metals (HMs) into the environment during informal e-waste processing has been a major concern. However, there is insufficient information on environmental contamination from e-waste recycling, associated ecological risk in Alaba International Market, a major electronic market in Lagos, Nigeria. The aims of this study were to determine the levels of HMs in soil, resulting from the e-waste recycling; and also assess associated ecological risks in Alaba international market. Samples of soils (334) were randomly collected seasonally for three years from fourteen selected e-waste activity points and two control sites. The samples were digested using standard methods and HMs analysed by inductive coupled plasma optical emission. Ecological risk was estimated using Ecological Risk index (ER), Potential Ecological Risk index (RI), Index of geoaccumulation (Igeo), Contamination factor (Cf) and degree of contamination factor (Cdeg). The concentrations range of HMs (mg/kg) in soil were: 16.7-11200.0 (Pb); 14.3-22600.0 (Cu); 1.90-6280.0 (Ni), 39.5-4570.0 (Zn); 0.79-12300.0 (Sn); 0.02-138.0 (Cd); 12.7-1710.0 (Ba); 0.18-131.0 (Cr); 0.07-28.0 (V), while As was below detection limit. Concentrations range in control soils were 1.36-9.70 (Pb), 2.06-7.60 (Cu), 1.25-5.11 (Ni), 3.62-15.9 (Zn), BDL-0.56 (Sn), BDL-0.01 (Cd), 14.6-47.6 (Ba), 0.21–12.2 (Cr) and 0.22-22.2 (V). The trend in ecological risk index was in the order Cu > Pb > Ni > Zn > Cr > Cd > Ba > V. The potential ecological risk index with respect to informal e-waste activities were: burning > dismantling > disposal > stockpiling. The index of geo accumulation indices revealed that soils were extremely polluted with Cd, Cu, Pb, Zn and Ni. The contamination factor indicated that 93% of the studied areas have very high contamination status for Pb, Cu, Ba, Sn and Co while Cr and Cd were in the moderately contaminated status. The degree of contamination decreased in the order of Sn > Cu > Pb >> Zn > Ba > Co > Ni > V > Cr > Cd. Heavy metal contamination of Alaba international market environment resulting from informal e-waste processing was established. Proper management of e-waste and remediation of the market environment are recommended to minimize the ecological risks.

Keywords: Alaba international market, ecological risk, electronic waste, heavy metal contamination

Procedia PDF Downloads 186
2211 Geochemical Evaluation of Weathering-Induced Release of Trace Metals from the Maastritchian Shales in Parts of Bida an Anambra Basins, Nigeria

Authors: Adetunji Olusegun Aderigibigbe

Abstract:

Shales, especially black shales, are of great geological significance, in the study of heavy/trace metal contamination. This is due to their abundance in occurrence and high concentration of heavy metals embedded which are released during their weathering. Heavy metals constitute one of the most dangerous pollution known to human because they are toxic (i.e., carcinogenic), non-biodegradable and can enter the global eco-biological circle. In the past, heavy metal contamination in aquatic environment and agricultural top soil has been attributed to industrial wastes, mining extractions and pollution from traffic vehicles; only a few studies have focused on weathering of shale as possible source of heavy metal contamination. Based on the above background, this study attempts to establish weathering of shale as possible source of trace/heavy metal contaminations. This was done by carefully selecting fresh and their corresponding weathered shale samples from selected localities in Bida and Anambra Basins. The samples were analysed in Activation Laboratories Ltd; Ontario, Canada for trace/heavy metal. It was observed that some major and trace metals were released during weathering, i.e., some were depleted and some enriched. By this contamination of water zones and agricultural top soils are not only traceable to biogenic processes but geogenic inputs (weathering of shale) as well.

Keywords: contamination, fresh samples, heavy metals, pollution, shales, trace metals, weathered samples

Procedia PDF Downloads 116
2210 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 259
2209 Revisiting the Donning and Doffing Procedure: Ensuring a Coordinated Practice

Authors: Deanna Ruano-Meas, Laura Shenkman

Abstract:

Variances are seen in the way healthcare personnel (HCP) don and doff PPE risking contamination to self and others. By standardizing practice, variances in technique decrease, and so does the risk of contamination. To implement this change, the Model for Improvement will be used. A system change will be developed that will outline the role of the organizational leader’s support of HCP in the proper donning and doffing of PPE. Interventions will include environmental surveys to assess the safety and work situation ensuring a permissible environment, plan audits to confirm consistency, and the assessment of PPE wear for standardization. The change will also include an educational plan that will involve instruction of the current guidelines recommended by the Centers for Disease Control and Prevention (CDC) to all pertinent HCP, and the incorporation of PPE education in yearly educational training. The goal is a standardized practice and a reduced risk of contamination through education and organizational support. Personal protective equipment has had recent attention with the coming of the SARS-CoV-2. The realization that proper technique is important to decreasing contamination of pathogens has led to the revising of current processes.

Keywords: donning and doffing, HAI, infection control, PPE

Procedia PDF Downloads 184
2208 Assessment of Heavy Metal Contamination for the Sustainable Management of Vulnerable Mangrove Ecosystem, the Sundarbans

Authors: S. Begum, T. Biswas, M. A. Islam

Abstract:

The present research investigates the distribution and contamination of heavy metals in core sediments collected from three locations of the Sundarbans mangrove forest. In this research, quality of the analysis is evaluated by analyzing certified reference materials IAEA-SL-1 (lake sediment), IAEA-Soil-7, and NIST-1633b (coal fly ash). Total concentrations of 28 heavy metals (Na, Al, K, Ca, Sc, Ti, V, Cr, Mn, Fe, Co, Zn, Ga, As, Sb, Cs, La, Ce, Sm, Eu, Tb, Dy, Ho, Yb, Hf, Ta, Th, and U) have determined in core sediments of the Sundarbans mangrove by neutron activation analysis (NAA) technique. When compared with upper continental crustal (UCC) values, it is observed that mean concentrations of K, Ti, Zn, Cs, La, Ce, Sm, Hf, and Th show elevated values in the research area is high. In this research, the assessments of metal contamination levels using different environmental contamination indices (EF, Igeo, CF) indicate that Ti, Sb, Cs, REEs, and Th have minor enrichment of the sediments of the Sundarbans. The modified degree of contamination (mCd) of studied samples of the Sundarbans ecosystem show low contamination. The pollution load index (PLI) values for the cores suggested that sampling points are moderately polluted. The possible sources of the deterioration of the sediment quality can be attributed to the different chemical carrying cargo accidents, port activities, ship breaking, agricultural and aquaculture run-off of the area. Pearson correlation matrix (PCM) established relationships among elements. The PCM indicates that most of the metal's distributions have been controlled by the same factors such as Fe-oxy-hydroxides and clay minerals, and also they have a similar origin. The poor correlations of Ca with most of the elements in the sediment cores indicate that calcium carbonate has a less significant role in this mangrove sediment. Finally, the data from this research will be used as a benchmark for future research and help to quantify levels of metal pollutions, as well as to manage future ecological risks of the vulnerable mangrove ecosystem, the Sundarbans.

Keywords: contamination, core sediment, trace element, sundarbans, vulnerable

Procedia PDF Downloads 111
2207 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 118
2206 Objective Assessment of the Evolution of Microplastic Contamination in Sediments from a Vast Coastal Area

Authors: Vanessa Morgado, Ricardo Bettencourt da Silva, Carla Palma

Abstract:

The environmental pollution by microplastics is well recognized. Microplastics were already detected in various matrices from distinct environmental compartments worldwide, some from remote areas. Various methodologies and techniques have been used to determine microplastic in such matrices, for instance, sediment samples from the ocean bottom. In order to determine microplastics in a sediment matrix, the sample is typically sieved through a 5 mm mesh, digested to remove the organic matter, and density separated to isolate microplastics from the denser part of the sediment. The physical analysis of microplastic consists of visual analysis under a stereomicroscope to determine particle size, colour, and shape. The chemical analysis is performed by an infrared spectrometer coupled to a microscope (micro-FTIR), allowing to the identification of the chemical composition of microplastic, i.e., the type of polymer. Creating legislation and policies to control and manage (micro)plastic pollution is essential to protect the environment, namely the coastal areas. The regulation is defined from the known relevance and trends of the pollution type. This work discusses the assessment of contamination trends of a 700 km² oceanic area affected by contamination heterogeneity, sampling representativeness, and the uncertainty of the analysis of collected samples. The methodology developed consists of objectively identifying meaningful variations of microplastic contamination by the Monte Carlo simulation of all uncertainty sources. This work allowed us to unequivocally conclude that the contamination level of the studied area did not vary significantly between two consecutive years (2018 and 2019) and that PET microplastics are the major type of polymer. The comparison of contamination levels was performed for a 99% confidence level. The developed know-how is crucial for the objective and binding determination of microplastic contamination in relevant environmental compartments.

Keywords: measurement uncertainty, micro-ATR-FTIR, microplastics, ocean contamination, sampling uncertainty

Procedia PDF Downloads 77
2205 Distributed Cyber Physical Secure Framework for DC Microgrids: DC Ship Power System Applications

Authors: Grace karimi Muriithi, Behnaz Papari, Ali Arsalan, Christopher Shannon Edrington

Abstract:

Complexity and nonlinearity of the control system design is increasing for DC microgrid applications when the cyber concept associated with the technology constraints will added to the picture. Controllers’ functionality during the critical operation mode is required to guaranteed specifically for a high profile applications such as NAVY DC ship power system (SPS) as an small-scaled DC microgrid. Thus, SPS is susceptible to cyber-attacks and, accordingly, can provide the disastrous effects. In this study, a machine learning (ML) approach is demonstrated to offer the promising performance of SPS for developing an effective and robust functionality over attacks time. Simulation results analysis demonstrate that the proposed method can improve the controllability successfully.

Keywords: controlability, cyber attacks, distribute control, machine learning

Procedia PDF Downloads 96
2204 Vertical Distribution of Heavy Metals and Enrichment in Core Marine Sediments of East Malaysia by INAA and ICP-MS

Authors: Ahmadreza Ashraf, Elias Saion, Elham Gharib Shahi, Chee Kong Yap, Mohd Suhaimi Hamzah

Abstract:

Fifty-five core marine sediments from three locations at South China Sea and one location each at Sulu Sea and Sulawesi Sea of coastal East Malaysia was analyzed for heavy metals using Instrumental Neutron Activation Analysis and Inductively Coupled Plasma Mass Spectroscopy. The enrichment factor of As, Cd, Cr, Cu, Ni, Pb, and Zn varied from 0.42 to 4.26, 0.50 to 2.34, 0.31 to 0.82, 0.20 to 0.61, 0.91 to 1.92, 0.23 to 1.52, and 0.90 to 1.28 respectively, with the modified degree of contamination values below 0.6. Comparative data show that coastal East Malaysia is of low levels of contamination.

Keywords: coastal East Malaysia, core marine sediments, enrichment factor, heavy metals, INAA and ICP method, modified degree of contamination

Procedia PDF Downloads 320
2203 Recirculated Sedimentation Method to Control Contamination for Algal Biomass Production

Authors: Ismail S. Bostanci, Ebru Akkaya

Abstract:

Microalgae-derived biodiesel, fertilizer or industrial chemicals' production with wastewater has great potential. Especially water from a municipal wastewater treatment plant is a very important nutrient source for biofuel production. Microalgae biomass production in open ponds system is lower cost culture systems. There are many hurdles for commercial algal biomass production in large scale. One of the important technical bottlenecks for microalgae production in open system is culture contamination. The algae culture contaminants can generally be described as invading organisms which could cause pond crash. These invading organisms can be competitors, parasites, and predators. Contamination is unavoidable in open systems. Potential contaminant organisms are already inoculated if wastewater is utilized for algal biomass cultivation. Especially, it is important to control contaminants to retain in acceptable level in order to reach true potential of algal biofuel production. There are several contamination management methods in algae industry, ranging from mechanical, chemical, biological and growth condition change applications. However, none of them are accepted as a suitable contamination control method. This experiment describes an innovative contamination control method, 'Recirculated Sedimentation Method', to manage contamination to avoid pond cash. The method can be used for the production of algal biofuel, fertilizer etc. and algal wastewater treatment. To evaluate the performance of the method on algal culture, an experiment was conducted for 90 days at a lab-scale raceway (60 L) reactor with the use of non-sterilized and non-filtered wastewater (secondary effluent and centrate of anaerobic digestion). The application of the method provided the following; removing contaminants (predators and diatoms) and other debris from reactor without discharging the culture (with microscopic evidence), increasing raceway tank’s suspended solids holding capacity (770 mg L-1), increasing ammonium removal rate (29.83 mg L-1 d-1), decreasing algal and microbial biofilm formation on inner walls of reactor, washing out generated nitrifier from reactor to prevent ammonium consumption.

Keywords: contamination control, microalgae culture contamination, pond crash, predator control

Procedia PDF Downloads 191
2202 Use of High Hydrostatic Pressure as an Alternative Preservation Method for Fresh Dates, Rutab

Authors: Salah Mohammed Al-Eid, Siddig Hussein Hamad, Fahad Mohammed Aljassas

Abstract:

The effects of high hydrostatic pressure (HHP) treatments on microbial contamination, chemical and physical properties of fresh dates (Rutab stage) were studied. Khalas, Barhi and Hilali cultivars were treated at 200, 250, 300 and 350 MPa using HHP research apparatus. The objective of such treatments was to preserve fresh dates without adversely affecting its properties. Treating fresh dates at 300 MPa for 5 minutes at 40°C reduced microbial contamination in about 2.5 log cycles. Applying 250 MPa was enough to control Rutab contamination with molds, yeasts, and coliforms. Both treatments were enough to reduce Rutab microbial contamination to acceptable levels. HHP caused no significant effect on Rutab chemical properties (moisture, sugars, protein, pectin and acidity). However, a slight decrease in moisture contents due to HHP was observed. Rutab lightness (L*) significantly decreased due to the application of HHP. Only Rutab treated at 300 MPs gave lower redness (a*) values compared with an untreated sample. The effect of 300 MPa on increasing yellowness (b*) was observed for Barhi and Hilali but decreasing for Khalas. The hardness of all Rutab cultivars significantly decreased as a result of HHP application. In fact, the pressure applied at 300 MPa had an adverse effect on texture, which may limit its suitability for use in Rutab preservation.

Keywords: high hydrostatic pressure, fresh dates (Rutab), microbial contamination, color, texture

Procedia PDF Downloads 281
2201 Aflatoxin Contamination of Abattoir Wastes in Ogun State, Nigeria

Authors: A. F. Gbadebo, O. O. Atanda, M. C. Adetunji

Abstract:

The study investigated the level of aflatoxin contamination of abattoir wastes in Ogun State, Nigeria, due to continued complaints of poor hygiene of abattoir centers in the states as a result of improper disposal of abattoir wastes. Wastes from the three senatorial districts of the state were evaluated for their levels of aflatoxin contamination. The moisture content, total plate count, fungal counts, percentage frequency of fungal occurrence as well as the level of aflatoxin contamination of the abattoir wastes were determined by standard methods. The moisture content of the wastes ranged between 79.10-87.46 %, total plate count from 1.37-3.27×10³cfu/ml, and fungal counts from 2.73-3.30×10²cfu/ml. Four fungal species: Aspergillus niger, Aspergillus flavus, Aspergillus ochraceus, and Penicillium citrinum were isolated from the wastes, with Aspergillus flavus having the highest percentage frequency of occurrence of 29.76%. The aflatoxin content of the samples was found to range between 3.20-4.80 µg/kg. These findings showed that abattoir wastes from Ogun State are contaminated with aflatoxins and pose a health risk to humans and animals.

Keywords: abattoir wastes, aflatoxin, microbial load, Ogun state

Procedia PDF Downloads 120
2200 An Assessment of Trace Heavy Metal Contamination of Some Edible Oils Regularly Marketed in Benue and Taraba States of Nigeria

Authors: Raphael Odoh, Obida J. Oko, Mary S. Dauda

Abstract:

The determination of Cd, Cr, Cu, Fe,Mn, Ni, Pb and Zn contents in edible oils (palm oil, ground-nut oil and soybean oil) bought from various markets of Benue and Taraba state were carried out with flame atomic absorption spectrophotometric technique. The method 3031 developed acid digestion of oils for metal analysis by atomic absorption or ICP spectrometry was used in the preparation of the edible oil samples for the determination of total metal content in this study. The overall results (µg/g) in palm oil sample ranged from 0.028-0.076, 0.035-0.092, 1.011-1.955, 2.101-4.892, 0.666-0.922, 0.054-0.095, 0.031-0.068 and 1.987-2.971 for Cd, Cr, Cu, Fe, Mn, Ni, Pb and Zn respectively, while in ground-nut oil the overall results ranged from 0.011-0.042, 0.011-0.052, 0.133-0.788, 1.789-2.511, 0.078-0.765, 0.045-0.092, 0.011-0.028 and 1.098-1.997 for Cd, Cr, Cu, Fe, Mn, Ni, Pb and Zn respectively. Of the heavy metals considered Cd and Ni showed the highest contamination in the soybean oil sample. The overall results in soybean oil samples ranged from 0.011-0.015, 0.017-0.032, 0.453-0.987, 1.789-2.511, 0.089-0.321, 0.011-0.016, 0.012-0.065 and 1.011-1.997 for Cd, Cr, Cu, Fe, Mn, Ni, Pb and Zn respectively. The concentration of Pb was the highest. The degree of contamination by each metal was estimated by the transfer factor. The transfer factors obtained for Cd, Cr, Cu, Fe, Mn, Ni, Pb and Zn in edible oils (palm oil, ground-nut oil and soybean oil) were 10.800, 16.500, 16.000, 18.813, 15.115, 14.230, 23.000 and 9.418 for Cd, Cr, Cu, Fe, Mn, Ni, Pb and Zn in palm oil, and 7.000, 12.500, 8.880, 11.333, 7.708, 10.833, 15.00 and 6.608 for Cd, Cr, Cu, Fe, Mn, Ni, Pb and Zn in ground-nut oil while for soybean oil the transfer factors were 13.000, 11.000, 7.642, 11.578, 4.486, 13.00, 12.333 and 4.412 for Cd, Cr, Cu, Fe, Mn, Ni, Pb and Zn respectively. The inter-element correlation was found among metals in edible oil samples using Pearson’s correlation co-efficient. There were positive and negative correlations among the metals determined. All Metals determined showed degree of contamination but concentrations lower than the USP specification.

Keywords: Benue State, contamination, edible oils, heavy metals, markets, Taraba State

Procedia PDF Downloads 307
2199 The Trauma Suffered by Left behind Children and Its Impact on Their Emotional Development: A Pilot Study with Brazilian Immigrants in the United States

Authors: Liliane Clark

Abstract:

Immigrating to a different country may imply having to handle many difficult exertions. There is a particular issue that has to be endured by some immigrants: the children they had to leave behind. It is a phenomenon that occurs with certain frequency. Surprisingly, despite the fact that immigration in the United States is such a large proceeding, there is not much research about the topic in America exploring the trauma of the abandonment caused by this separation and its consequences on the mental health of those children. The term “left behind children” is usually applied to children who were left behind by their parents in their original nation under the care of a noteworthy relative, frequently the grandparents, when they moved to another country. This preliminary research, which is a partial study projected for a doctoral thesis, investigated whether the trauma of abandonment experienced by ten left behind children had affected their emotional development. The Strengths and Difficulties Questionnaire (SDQ) and a brief interview were utilized to assess the information. The SDQ explored scales such as emotional symptoms, conduct problems, hyperactivity, peer problems and prosocial behavior. In this pilot study, the results indicated that all these issues had some sort of significant correlation between them. During the interviews, the participants or their parents identified a range of symptoms: anxiety disorder, eating disorders, panic attacks, psychotic-like experiences, drug use and depression. Hence, it seems that there is a connection between the trauma of abandonment suffered due to the separation and the children’s consequent symptomatic behavior. Further studies are indeed necessary to validate the initial results of this investigation.

Keywords: abandonment, parent migration, psychological problems, trauma

Procedia PDF Downloads 172
2198 Optimization of the Co-Precipitation of Industrial Waste Metals in a Continuous Reactor System

Authors: Thomas S. Abia II, Citlali Garcia-Saucedo

Abstract:

A continuous copper precipitation treatment (CCPT) system was conceived at Intel Chandler Site to serve as a first-of-kind (FOK) facility-scale waste copper (Cu), nickel (Ni), and manganese (Mn) co-precipitation facility. The process was designed to treat highly variable wastewater discharged from a substrate packaging research factory. The paper discusses metals co-precipitation induced by internal changes for manufacturing facilities that lack the capacity for hardware expansion due to real estate restrictions, aggressive schedules, or budgetary constraints. Herein, operating parameters such as pH and oxidation reduction potential (ORP) were examined to analyze the ability of the CCPT System to immobilize various waste metals. Additionally, influential factors such as influent concentrations and retention times were investigated to quantify the environmental variability against system performance. A total of 2,027 samples were analyzed and statistically evaluated to measure the performance of CCPT that was internally retrofitted for Mn abatement to meet environmental regulations. In order to enhance the consistency of the influent, a separate holding tank was cannibalized from another system to collect and slow-feed the segregated Mn wastewater from the factory into CCPT. As a result, the baseline influent Mn decreased from 17.2+18.7 mg1L-1 at pre-pilot to 5.15+8.11 mg1L-1 post-pilot (70.1% reduction). Likewise, the pre-trial and post-trial average influent Cu values to CCPT were 52.0+54.6 mg1L-1 and 33.9+12.7 mg1L-1, respectively (34.8% reduction). However, the raw Ni content of 0.97+0.39 mg1L-1 at pre-pilot increased to 1.06+0.17 mg1L-1 at post-pilot. The average Mn output declined from 10.9+11.7 mg1L-1 at pre-pilot to 0.44+1.33 mg1L-1 at post-pilot (96.0% reduction) as a result of the pH and ORP operating setpoint changes. In similar fashion, the output Cu quality improved from 1.60+5.38 mg1L-1 to 0.55+1.02 mg1L-1 (65.6% reduction) while the Ni output sustained a 50% enhancement during the pilot study (0.22+0.19 mg1L-1 reduced to 0.11+0.06 mg1L-1). pH and ORP were shown to be significantly instrumental to the precipitative versatility of the CCPT System.

Keywords: copper, co-precipitation, industrial wastewater treatment, manganese, optimization, pilot study

Procedia PDF Downloads 260
2197 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 531
2196 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 153
2195 Impact of Water, Sanitation and Hygiene Interventions on Water Quality in Primary Schools of Pakistan

Authors: Jamil Ahmed, Li P. Wong, Yan P. Chua

Abstract:

The United Nation's sustainable development goals include the target to ensure access to water and sanitation for all; however, very few studies have assessed school-based drinking water in Pakistan. The purpose of this study was to characterize water quality in primary schools of Pakistan and to characterize how recent WASH interventions were associated with school water quality. We conducted a representative cross-sectional study of primary schools in the Sindh province of Pakistan. We used structured observations and structured interviews to ascertain the school’s WASH conditions. Our primary exposures of interest were the implementation of previous WASH interventions in the school and the water source type. Outcomes of interest included water quality (measured by various chemical and microbiological indicators) and water availability at the school’s primary drinking water source. We used log-binomial regression to characterize how WASH exposures were associated with water quality outcomes. We collected data from 256 schools. Groundwater was the primary drinking water source at most schools (87%). Water testing showed that 14% of the school’s water had arsenic above the WHO recommendations, and over 50% of the water samples exceeded recommendations for both lead and cadmium. A majority of the water sources (52%) had fecal coliform contamination. None of the schools had nitrate contamination (0%), and few had fluoride contamination (5%). Regression results indicated that having a recent WASH intervention at the school was not associated with either arsenic contamination (prevalence ratio=0.97; 95% CI: 0.46-2.1) or with fecal coliform contamination (PR=0.88; 95% CI: 0.67-1.17). Our assessment unveiled several water quality gaps that exist, including high heavy metal and fecal contamination. Our findings will help various stakeholders to take suitable action to improve water quality in Pakistani schools.

Keywords: WASH interventions, water quality, primary school children, heavy metals

Procedia PDF Downloads 129
2194 Electronic Patient Record (EPR) System in South Africa: Results of a Pilot Study

Authors: Temitope O. Tokosi, Visvanathan Naicker

Abstract:

Patient health records contain sensitive information for which an electronic patient record (EPR) system can safely secure and transmit amongst clinicians for use in improving health delivery. Clinician’s use of the behaviour of these systems is under scrutiny to assess their attributes towards health technology. South Africa (SA) clinicians responded to a pilot study survey to assess their understanding of EPR, what attributes are important towards technology use and more importantly streamlining the survey for a larger study. Descriptive statistics using mean scores was used because of the small sample size of 11 clinicians who completed the survey. Nine (9) constructs comprising 62 items were used and a Cronbach alpha score of 0.883 was obtained. Limitations and discussions conclude the study.

Keywords: EPR, clinicians, pilot study, South Africa

Procedia PDF Downloads 255
2193 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 7
2192 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 141
2191 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 445
2190 EMPIRICAL ANALYSIS OF A GLOBAL IMPACT OF CONSUMER PRIVACY AND PROTECTION LAWS, ELECTRONIC TRANSACTION LAWS, PRIVACY AND DATA PROTECTION LAWS, AND CYBERCRIME LEGISLATION ON CYBER ATTACKS AND MALWARE TYPES: PROBLEMS AND PROSPECTS

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study aimed to probe how well cyber law operates worldwide, and then draw a logical conclusion on Nigeria’s experience using a deductive reasoning approach. With a purposive or structured sampling technique, seventy-eight countries (thirteen countries each from six continents of the world) were selected as sample size. The methods used for analysing the data include the Analysis of Variance (ANOVA), Pearson product-moment correlation and regression analysis, and multiple regression analysis methods respectively. At a two-tailed test of 0.05 confidence level, the results of findings established that about 23.74 (F calculated) which is > 2.23 (F critical) claimed the total cyber-attacks and malware types vary significantly. Also, at a two-tailed confidence level test of 0.05, 0.75 (F calculated) is < 1.7 (F critical), and the P-value = 0.73 to establish significantly that cybercrime legislation does not vary statistically. More so, the calculated value (tcalculated) = 7.305 is < table value (tcritical) = 12.05 at a two-tailed test of 0.05 to imply that electronic transactions law does not statistically impact the total number of cyber-attacks. The result also proved that Consumer Privacy and Protection law does not statistically impact the total number of cyber-attacks as the calculated value (tcalculated) = 6.21 < table value (tcritical) = 20.82 at a two-tailed test of 0.05. In addition, the calculated value (tcalculated) = 7.97 < table value (tcritical) = 14.76 at a two-tailed test of 0.05 implied that Privacy and Data Protection law does not statistically impact the total number of cyber-attacks worldwide. The calculated value (tcalculated) = 5.75 < table value (tcritical) = 12.65 at a two-tailed test of 0.05 to prove that cybercrime law does not statistically impact the total number of cyber-attacks. Finally, the calculated value (tcalculated) = 6.21 < table value (tcritical) = 20.82 at a two-tailed test of 0.05 concludes that combined multiple cyber laws do not significantly impact the total number of cyber-attacks worldwide. Recommendations were made based on the results of findings from the study.

Keywords: Cybercrime Legislation, Cyber Attacks, Consumer Privacy and Protection Law, Detection, Electronic Transaction Law, Prevention, Privacy and Data Protection Law, Prohibition, Prosecution

Procedia PDF Downloads 10
2189 Food Safety Aspects of Pesticide Residues in Spice Paprika

Authors: Sz. Klátyik, B. Darvas, M. Mörtl, M. Ottucsák, E. Takács, H. Bánáti, L. Simon, G. Gyurcsó, A. Székács

Abstract:

Environmental and health safety of condiments used for spicing food products in food processing or by culinary means receive relatively low attention, even though possible contamination of spices may affect food quality and safety. Contamination surveys mostly focus on microbial contaminants or their secondary metabolites, mycotoxins. Chemical contaminants, particularly pesticide residues, however, are clearly substantial factors in the case of given condiments in the Capsicum family including spice paprika and chilli. To assess food safety and support the quality of the Hungaricum product spice paprika, the pesticide residue status of spice paprika and chilli is assessed on the basis of reported pesticide contamination cases and non-compliances in the Rapid Alert System for Food and Feed of the European Union since 1998.

Keywords: spice paprika, Capsicum, pesticide residues, RASFF

Procedia PDF Downloads 378
2188 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.

Keywords: CAR processes, defense/attack strategies, exponential failure, survivability

Procedia PDF Downloads 381
2187 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 136
2186 Removal of Perchloroethylene, a Common Pollutant, in Groundwater Using Activated Carbon

Authors: Marianne Miguet, Gaël Plantard, Yves Jaeger, Vincent Goetz

Abstract:

The contamination of groundwater is a major concern. A common pollutant, the perchloroethylene, is the target contaminant. Water treatment process as Granular Activated Carbons are very efficient but requires pilot-scale testing to determine the full-scale GAC performance. First, the batch mode was used to get a reliable experimental method to estimate the adsorption capacity of a common volatile compound is settled. The Langmuir model is acceptable to fit the isotherms. Dynamic tests were performed with three columns and different operating conditions. A database of concentration profiles and breakthroughs were obtained. The resolution of the set of differential equations is acceptable to fit the dynamics tests and could be used for a full-scale adsorber.

Keywords: activated carbon, groundwater, perchloroethylene, full-scale

Procedia PDF Downloads 414
2185 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 345
2184 A Deep Reinforcement Learning-Based Secure Framework against Adversarial Attacks in Power System

Authors: Arshia Aflaki, Hadis Karimipour, Anik Islam

Abstract:

Generative Adversarial Attacks (GAAs) threaten critical sectors, ranging from fingerprint recognition to industrial control systems. Existing Deep Learning (DL) algorithms are not robust enough against this kind of cyber-attack. As one of the most critical industries in the world, the power grid is not an exception. In this study, a Deep Reinforcement Learning-based (DRL) framework assisting the DL model to improve the robustness of the model against generative adversarial attacks is proposed. Real-world smart grid stability data, as an IIoT dataset, test our method and improves the classification accuracy of a deep learning model from around 57 percent to 96 percent.

Keywords: generative adversarial attack, deep reinforcement learning, deep learning, IIoT, generative adversarial networks, power system

Procedia PDF Downloads 12