Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1260

Search results for: salt and peppers attacks

1170 Mapping QTLs Associated with Salinity Tolerance in Maize at Seedling Stage

Authors: Mohammad Muhebbullah Ibne Hoque, Zheng Jun, Wang Guoying

Abstract:

Salinity stress is one of the most important abiotic factors contributing to crop growth and yield loss. Exploring the genetic basis is necessary to develop maize varieties with salinity tolerance. In order to discover the inherent basis for salinity tolerance traits in maize, 121 polymorphic SSR markers were used to analyze 163 F2 individuals derived from a single cross of inbred line B73 (a salt susceptible inbred line) and CZ-7 (a salt tolerant inbred line). A linkage map was constructed and the map covered 1195.2 cM of maize genome with an average distance of 9.88 cM between marker loci. Ten salt tolerance traits at seedling stage were evaluated for QTL analysis in maize seedlings. A total of 41 QTLs associated with seedling shoot and root traits were detected, with 16 and 25 QTLs under non-salinity and salinity condition, respectively. And only 4 major stable QTLs were detected in two environments. The detected QTLs were distributed on chromosomes 1, 2, 4, 5, 6, 7, 8, 9, and chromosome 10. Phenotypic variability for the identified QTLs for all the traits was in the range from 6.27 to 21.97%. Fourteen QTLs with more than 10% contributions were observed. Our results and the markers associated with the major QTL detected in this study have the potential application for genetic improvement of salt tolerance in maize through marker-assisted selection.

Keywords: salt tolerance, seedling stage, root shoot traits, quantitative trait loci, simple sequence repeat, maize

Procedia PDF Downloads 278
1169 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 276
1168 The Effect of Gibberellic Acid on Gamma-Aminobutyric Acid (GABA) Metabolism in Phaseolus Vulgaris L. Plant Exposed to Drought and Salt Stresses

Authors: Fazilet Özlem Çekiç, Seyda Yılmaz

Abstract:

Salinity and drought are important environmental problems in the world and have negative effects on plant metabolism. Gamma-aminobutyric acid (GABA), four-carbon non-protein amino acid, is a significant component of the free amino acid pool. GABA is widely distributed in prokaryotic and eukaryotic organisms. Environmental stress factors increase GABA accumulation in plants. Our aim was to evaluate the effect of gibberellic acid (GA) on GABA metabolism system during drought and salt stress factors in Phaseolus vulgaris L. plants. GABA, Glutamate dehydrogenase (GDH) activity, chlorophyll, and lipid peroxidation (MDA) analyses were determined. According to our results we can suggest that GA play a role in GABA metabolism during salt and drought stresses in bean plants. Also GABA shunt is an important metabolic pathway and key signaling allowing to adapt to drought and salt stresses.

Keywords: gibberellic acid, GABA, Phaseolus vulgaris L., salinity, drought

Procedia PDF Downloads 393
1167 Effect of Sodium Chloride Concentration and Degree of Neutralization on the Structure and Dynamics of Poly(Methacrylic Acid) (PMA) in Dilute Aqueous Solutions – a Molecular Dynamics Simulations Study

Authors: Abhishek Kumar Gupta

Abstract:

Atomistic Molecular Dynamics (MD) Simulations have been performed to study the effect of monovalent salt i.e. NaCl concentration (Cs) and chain degree of neutralization (f) on the structure and dynamics of anionic poly(methacrylic acid) (PMA) in dilute aqueous solutions. In the present study, the attention is to unveil the conformational structure, hydrogen-bonding, local polyion-counterion structure, h-bond dynamics, chain dynamics and thermodynamic enthalpy of solvation of a-PMA in dilute aqueous solutions as a function of salt concentration, Cs and f. The results have revealed that at low salt concentration, the conformational radius of gyration (Rg) increases and then decreases reaching a maximum in agreement with the reported light scattering experimental results. The Rg at f = 1 shows a continual decrease and acquire a plateau value at higher salt concentration in agreement with results obtained by light scattering experiments. The radial distribution functions between PMA, salt and water atoms has been computed with respect to atom and centre-of-mass to understand the intermolecular structure in detail. The results pertaining to PMA chain conformations and hydrogen bond autocorrelation function showcasing the h-bond dynamics will be presented. The results pertaining to chain dynamics will be presented. The results pertaining to counterion condensation on the PMA chain shows greater condensation of Na+ ions on to the carboxylate ions with increase in salt concentration. Moreover, the solvation enthalpy of the system as a function of salt concentration will be presented.

Keywords: conformations, molecular dynamics simulations, NaCl concentration, radial distribution functions

Procedia PDF Downloads 82
1166 Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks

Authors: Parul Khanna, Pavol Zavarsky, Dale Lindskog

Abstract:

Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password cracking methods, social engineering tools and other sources of publicly displayed information. The main purpose of doxing attacks is to threaten, embarrass, harass and humiliate the organization or individual. Various tools are used to perform doxing. Tools such as Maltego visualize organization’s architecture which helps in determining weak links within the organization. This paper discusses limitations of Maltego Chlorine CE 3.6.0 and suggests measures as to how organizations can use these tools to protect themselves from doxing attacks.

Keywords: advanced persistent threat, FOCA, OSINT, PII

Procedia PDF Downloads 227
1165 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 403
1164 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 350
1163 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 95
1162 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 55
1161 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures

Authors: Serkan Yağlı, Selçuk Dal

Abstract:

Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.

Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO

Procedia PDF Downloads 220
1160 Boiling Effect of Momordica charantia with Salt to the Antihiperglicemia Effectiveness of Diabetes Mellitus Rats

Authors: Zulfa D. Putri, Jumayanti Jumayanti, Hatiefah T. I. Melati, Kiki Indriati, Farah U. Mauhibah

Abstract:

Momordica charantia is a food that is often used for nutrition therapy for patients with Diabetes Mellitus (DM) because of its effect as antihiperglicemia. However, the bitter taste of Momordica charantia may be an obstacle to consume. Some people remove the bitter taste of this by boiling it with salt water. The purpose of this study was to determine the effect of Momordica charantia boiling with salt water in lowering blood glucose levels. This study is a quasi-experimental study with pre-post test with control group design. The research sample consisted of 25 rats Sprague-Dawley were divided into 5 groups: Control group of healthy, control group of DM, control group of DM with the addition of Momordica charantia are boiled by salt for 3 minutes, 6 minutes, and 9 minutes. Blood glucose levels were measured after 4 weeks using a spectrophotometer. These results indicate that there is the effect of bitter taste from Momordica charantia in lowering blood glucose levels in rats significantly. The conclusion of this study is giving a Momordica charantia juice in Sprague-Dawley rats that induced by alloxan has meaningful statistically proven by One Way ANOVA test (p = 0.00) in lowering blood glucose levels of rats.

Keywords: antihiperglicemia, diabetes mellitus, momordica charantia, salt

Procedia PDF Downloads 204
1159 Optimization of Dissolution of Chevreul’s Salt in Ammonium Chloride Solutions

Authors: Mustafa Sertçelik, Hacali Necefoğlu, Turan Çalban, Soner Kuşlu

Abstract:

In this study, Chevreul’s salt was dissolved in ammonium chloride solutions. All experiments were performed in a batch reactor. The obtained results were optimized. Parameters used in the experiments were the reaction temperature, the ammonium chloride concentration, the reaction time and the solid-to-liquid ratio. The optimum conditions were determined by 24 factorial experimental design method. The best values of four parameters were determined as based on the experiment results. After the evaluation of experiment results, all parameters were found as effective in experiment conditions selected. The optimum conditions on the maximum Chevreul’s salt dissolution were the ammonium chloride concentration 4.5 M, the reaction time 13.2 min., the reaction temperature 25 oC, and the solid-to-liquid ratio 9/80 g.mL-1. The best dissolution yield in these conditions was 96.20%.

Keywords: Chevreul's salt, factorial experimental design method, ammonium chloride, dissolution, optimization

Procedia PDF Downloads 221
1158 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 366
1157 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 382
1156 Salicylic Acid Improves Growth, Physiological Attributes and Salt Tolerance in Bread Wheat Cultivar (Triticum Aestivum L.)

Authors: Faiza Ateeq, Huma Jawed, Kamran Azim, Nadeem Khalid

Abstract:

Abiotic constraints such as salinity stress reduce cereal production. Salicylic acid is an elicitor of abiotic stress tolerance in plants. The aim of this study was to investigate the effects of salicylic acid on bread wheat cultivars AAI_10 from Faisalabad, Pakistan (Triticum aestivum L.) grown under salt stress in the presence and absence of 0.5 mM salicylic acid. The Physiological test was performed using different concentrations of salt solutions, i.e., 0%, 1%, 2%, 4%, and 6% on leaf blades, and determined the germination of seedlings growth after 14 days. Results showed a reduction in the weights of wheat seedlings when it’s dry and fresh in the consideration of salt stress. Salicylic Acid treatment has a positive effect when evaluated in the case of salt-treated control. The morphological test (Lowry method) was performed to determine the concentration of proteins in different samples. Results showed that the samples treated with SA showed the highest absorbance(720nm) as compared to the control and other treated samples absorbance was determined. Thus, Salicylic Acid treating wheat seedlings enables the growth of anti-stress effects, such as maintaining proline accumulation. The morphological and physiological parameters revealed that SA treatment not only decreased the negative effect of salinity on the development of the seedlings but also accelerated the reparation of the growth processes. These results suggested that salicylic acid application improved the salt tolerance of bread wheat cultivars.

Keywords: salinity, salicylic acid, biotic and abiotic stresses, proline

Procedia PDF Downloads 29
1155 Exogenous Application of Silicon through the Rooting Medium Modulate Growth, Ion Uptake, and Antioxidant Activity of Barley (Hordeum vulgare L.) Under Salt Stress

Authors: Sibgha Noreen, Muhammad Salim Akhter, Seema Mahmood

Abstract:

Salt stress is an abiotic stress that causes a heavy toll on growth and development and also reduces the productivity of arable and horticultural crops. Globally, a quarter of total arable land has fallen prey to this menace, and more is being encroached because of the usage of brackish water for irrigation purposes. Though barley is categorized as salt-tolerant crop, but cultivars show a wide genetic variability in response to it. In addressing salt stress, silicon nutrition would be a facile tool for enhancing salt tolerant to sustain crop production. A greenhouse study was conducted to evaluate the response of barley (Hordeum vulgare L.) cultivars to silicon nutrition under salt stress. The treatments included [(a) four barley cultivars (Jou-87, B-14002, B-14011, B-10008); (b) two salt levels (0, 200 mM, NaCl); and (c) two silicon levels (0, 200ppm, K2SiO3. nH2O), arranged in a factorial experiment in a completely randomized design with 16 treatments and repeated 4 times. Plants were harvested at 15 days after exposure to different experimental salinity and silicon foliar conditions. Results revealed that various physiological and biochemical attributes differed significantly (p<0.05) in response to different treatments and their interactive effects. Cultivar “B-10008” excelled in biological yield, chlorophyll constituents, antioxidant enzymes, and grain yield compared to other cultivars. The biological yield of shoot and root organs was reduced by 27.3 and 26.5 percent under salt stress, while it was increased by 14.5 and 18.5 percent by exogenous application of silicon over untreated check, respectively. The imposition of salt stress at 200 mM caused a reduction in total chlorophyll content, chl ‘a’ , ‘b’ and ratio a/b by 10.6,16.8,17.1 and 7.1, while spray of 200 ppm silicon improved the quantum of the constituents by 10.4,12.1,10.2,10.3 over untreated check, respectively. The quantum of free amino acids and protein content was enhanced in response to salt stress and the spray of silicon nutrients. The amounts of superoxide dismutase, catalases, peroxidases, hydrogen peroxide, and malondialdehyde contents rose to 18.1, 25.7, 28.1, 29.5, and 17.6 percent over non-saline conditions under salt stress. However, the values of these antioxidants were reduced in proportion to salt stress by 200 ppm silicon applied as rooting medium on barley crops. The salt stress caused a reduction in the number of tillers, number of grains per spike, and 100-grain weight to the amount of 29.4, 8.6, and 15.8 percent; however, these parameters were improved by 7.1, 10.3, and 9.6 percent by foliar spray of silicon over untreated crop, respectively. It is concluded that the barley cultivar “B-10008” showed greater tolerance and adaptability to saline conditions. The yield of barley crops could be potentiated by a foliar spray of 200 ppm silicon at the vegetative growth stage under salt stress.

Keywords: salt stress, silicon nutrition, chlorophyll constituents, antioxidant enzymes, barley crop

Procedia PDF Downloads 13
1154 A Blind Three-Dimensional Meshes Watermarking Using the Interquartile Range

Authors: Emad E. Abdallah, Alaa E. Abdallah, Bajes Y. Alskarnah

Abstract:

We introduce a robust three-dimensional watermarking algorithm for copyright protection and indexing. The basic idea behind our technique is to measure the interquartile range or the spread of the 3D model vertices. The algorithm starts by converting all the vertices to spherical coordinate followed by partitioning them into small groups. The proposed algorithm is slightly altering the interquartile range distribution of the small groups based on predefined watermark. The experimental results on several 3D meshes prove perceptual invisibility and the robustness of the proposed technique against the most common attacks including compression, noise, smoothing, scaling, rotation as well as combinations of these attacks.

Keywords: watermarking, three-dimensional models, perceptual invisibility, interquartile range, 3D attacks

Procedia PDF Downloads 446
1153 The Influence of Salt Body of J. Ech Cheid on the Maturity History of the Cenomanian: Turonian Source Rock

Authors: Mohamed Malek Khenissi, Mohamed Montassar Ben Slama, Anis Belhaj Mohamed, Moncef Saidi

Abstract:

Northern Tunisia is well known by its different and complex structural and geological zones that have been the result of a geodynamic history that extends from the early Mesozoic era to the actual period. One of these zones is the salt province, where the Halokinesis process is manifested by a number of NE/SW salt structures such as Jebel Ech-Cheid which represents masses of materials characterized by a high plasticity and low density. The salt masses extrusions that have been developed due to an extension that started from the late Triassic to late Cretaceous. The evolution of salt bodies within sedimentary basins have not only contributed to modify the architecture of the basin, but it also has certain geochemical effects which touch mainly source rocks that surround it. It has been demonstrated that the presence of salt structures within sedimentary basins can influence its temperature distribution and thermal history. Moreover, it has been creating heat flux anomalies that may affect the maturity of organic matter and the timing of hydrocarbon generation. Field samples of the Bahloul source rock (Cenomanan-Tunonian) were collected from different sights from all around Ech Cheid salt structure and evaluated using Rock-eval pyrolysis and GC/MS techniques in order to assess the degree of maturity evolution and the heat flux anomalies in the different zones analyze. The Total organic Carbon (TOC) values range between 1 to 9% and the (Tmax) ranges between 424 and 445°C, also the distribution of the source rock biomarkers both saturated and aromatic changes in a regular fashions with increasing maturity and this are shown in the chromatography results such as Ts/(Ts+Tm) ratios, 22S/(22S+22R) values for C31 homohopanes, ββ/(ββ+αα)20R and 20S/(20S+20R) ratios for C29 steranes which gives a consistent maturity indications and assessment of the field samples. These analyses are carried to interpret the maturity evolution and the heat flux around Ech Cheid salt structure through the geological history. These analyses also aim to demonstrate that the salt structure can have a direct effect on the geothermal gradient of the basin and on the maturity of the Bahloul Formation source rock. The organic matter has reached different stages of thermal maturity, but delineate a general increasing maturity trend. Our study confirms that the J. Ech Cheid salt body have on the first hand: a huge influence on the local distribution of anoxic depocentre at least within Cenomanian-Turonian time. In the second hand, the thermal anomaly near the salt mass has affected the maturity of Bahloul Formation.

Keywords: Bahloul formation, depocentre, GC/MS, rock-eval

Procedia PDF Downloads 217
1152 Constructing White-Box Implementations Based on Threshold Shares and Composite Fields

Authors: Tingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen

Abstract:

A white-box implementation of a cryptographic algorithm is a software implementation intended to resist extraction of the secret key by an adversary. To date, most of the white-box techniques are used to protect block cipher implementations. However, a large proportion of the white-box implementations are proven to be vulnerable to affine equivalence attacks and other algebraic attacks, as well as differential computation analysis (DCA). In this paper, we identify a class of block ciphers for which we propose a method of constructing white-box implementations. Our method is based on threshold implementations and operations in composite fields. The resulting implementations consist of lookup tables and few exclusive OR operations. All intermediate values (inputs and outputs of the lookup tables) are masked. The threshold implementation makes the distribution of the masked values uniform and independent of the original inputs, and the operations in composite fields reduce the size of the lookup tables. The white-box implementations can provide resistance against algebraic attacks and DCA-like attacks.

Keywords: white-box, block cipher, composite field, threshold implementation

Procedia PDF Downloads 136
1151 Treatment of Oil Recovery Water Using Direct and Indirect Electrochemical Oxidation

Authors: Tareg Omar Mansour, Khaled Omar Elhaji

Abstract:

Model solutions of pentanol in the salt water of various concentrations were subjected to electrochemical oxidation using a dimensionally stable anode (DSA) and a platinised titanium cathode. The removal of pentanol was analysed over time using gas chromatography (GC) and by monitoring the total organic carbon (TOC) concentration of the reaction mixture. It was found that the removal of pentanol occurred more efficiently at higher salinities and higher applied electrical current values. When using a salt concentration of 20,000 ppm and an applied current of 100 mA there was a decrease in concentration of pentanol of 15 %. When the salt concentration and applied current were increased to 58,000 ppm and 500 mA respectively, the decrease in concentration was improved to 64 %.

Keywords: dimensionally stable anode (DSA), total organic hydrocarbon (TOC), gas chromatography mass spectrometry (GCMS), electrochemical oxidation

Procedia PDF Downloads 356
1150 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.

Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection

Procedia PDF Downloads 132
1149 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 97
1148 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 175
1147 Comparative Analysis of Short and Long Term Salt Stress on the Photosynthetic Apparatus and Chloroplast Ultrastructure of Thellungiella salsuginea

Authors: Rahma Goussi, Walid Derbali, Arafet Manaa, Simone Cantamessa, Graziella Berta, Chedly Abdelly, Roberto Barbato

Abstract:

Salinity is one of the most important abiotic affecting plant growth and productivity worldwide. Photosynthesis, together with cell growth, is among the primary processes to be affected by salinity. Here, we report the effects of salinity stress on the primary processes of photosynthesis in a model halophyte Thellungiella Salsuginea. Plants were cultivated in hydroponic system with different NaCl concentrations (0, 100, 200 and 400 mM) during 2 weeks. The obtained results showed an obvious change in the photosynthetic efficiency of photosystem I (PSI) and phostosytem II (PSII), related to NaCl concentration supplemented to the medium and the stress duration considered. With moderate salinity (100 and 200 mM NaCl), no significant variation was observed in photosynthetic parameters of PSI and PSII and Chl fluorescence whatever the time of stress application. Also, the photosynthesis apparatus Fo, Fm and Fv fluorescence, as well as Fv/Fm were not affected by salt stress. While a significant decrease was observed on quantum yields Y(I), Y(II) and electron transport rate ETR(I), ETR(II) under high salt treatment (400 mM NaCl) with prolonged period (15 days). This reduction is quantitatively compensated by a corresponding increase of energy dissipation Y(NPQ) and a progressive decrease in Fv/Fm under salt treatment. The intensity of the OJIP fluorescence transient decreased with increase in NaCl concentration, with a major effect observed during prolonged period of salt stress. Ultrastructural analysis with Light Microscopy and Transmission Electron Microscopy of T. salsuginea chloroplasts showed some cellular changes, such as the shape of the mesophyll cells and number of chloroplast/cell only under higher NaCl concentration. Salt-stress caused the swelling of thylakoids in T. Salsuginea mesophyll with more accumulation of starch as compared to control plant.

Keywords: fluorescence, halophyte, photosynthesis, salt stress

Procedia PDF Downloads 347
1146 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 338
1145 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 245
1144 Application of Arbuscular Mycorrhizal Fungi as Biologically Based Strategy for Mitigation of Adverse Impact of Salt Stress on Wheat

Authors: Abeer Hashem, Khalid F. Almutairi, Ulkar Ibrahimova, Elsayed Fathi Abdallah

Abstract:

Salinity poses a significant challenge to wheat production, necessitating the exploration of strategies to mitigate its adverse effects. The present investigation aims to study the impact of arbuscular mycorrhizal fungi (AMF) application to improve plant tolerance in terms of growth, carbohydrate, photosynthetic characteristics, and antioxidant enzyme activities under salt stress conditions. So, a randomized complete block design with five replications was employed comprising various treatments of AMF application under salinity stress (200mM), and control samples were used for each treatment. The obtained results demonstrated significantly that AMF used in this study showed beneficial impacts in all parameters used as sensitive monitor for relation of plant-salt microbe interaction. The root colonization by AMF showed the highest plant growth criteria, relative water content, soluble sugar, starch, and total non-structural carbohydrates under both control and salinity stress conditions. Moreover, the application of AMF-treated plants showed the highest soluble protein concentration and activity in leaves and antioxidant enzymes (catalase, superoxide dismutase, guaiacol peroxidase). These findings highlight the potential impact of AMF application as a biologically based strategy to manage the mitigation of salt stress on wheat, which increases the availability of many salt marsh habitats for sustainable agriculture of such strategy crops.

Keywords: arbuscular mycorrhizal fungi, salt stress, plant growth criteria, soluble protein, antioxidant enzymes, wheat plant

Procedia PDF Downloads 5
1143 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 107
1142 Distributed Cyber Physical Secure Framework for DC Microgrids: DC Ship Power System Applications

Authors: Grace karimi Muriithi, Behnaz Papari, Ali Arsalan, Christopher Shannon Edrington

Abstract:

Complexity and nonlinearity of the control system design is increasing for DC microgrid applications when the cyber concept associated with the technology constraints will added to the picture. Controllers’ functionality during the critical operation mode is required to guaranteed specifically for a high profile applications such as NAVY DC ship power system (SPS) as an small-scaled DC microgrid. Thus, SPS is susceptible to cyber-attacks and, accordingly, can provide the disastrous effects. In this study, a machine learning (ML) approach is demonstrated to offer the promising performance of SPS for developing an effective and robust functionality over attacks time. Simulation results analysis demonstrate that the proposed method can improve the controllability successfully.

Keywords: controlability, cyber attacks, distribute control, machine learning

Procedia PDF Downloads 76
1141 Thermo-Economic Analysis of a Natural Draft Direct Cooling System for a Molten Salt Power Tower

Authors: Huiqiang Yang, Domingo Santana

Abstract:

Reducing parasitic power consumption of concentrating solar power plants is the main challenge to increase the overall efficiency, particularly for molten salt tower technology. One of the most effective approaches to reduce the parasitic power consumption is to implement a natural draft dry cooling system instead of the standard utilized mechanical draft dry cooling system. In this paper, a thermo-economic analysis of a natural draft direct cooling system was performed based on a 100MWe commercial scale molten salt power plant. In this configuration with a natural draft direct cooling system, the exhaust steam from steam turbine flows directly to the heat exchanger bundles inside the natural draft dry cooling tower, which eliminates the power consumption of circulation pumps or fans, although the cooling tower shadows a portion of the heliostat field. The simulation results also show that compared to a mechanical draft cooling system the annual solar field efficiency is decreased by about 0.2% due to the shadow, which is equal to a reduction of approximately 13% of the solar field area. As a contrast, reducing the solar field size by 13% in purpose in a molten salt power plant with a natural draft drying cooling system actually will lead to a reduction of levelized cost of electricity (LCOE) by about 4.06% without interfering the power generated.

Keywords: molten salt power tower, natural draft dry cooling, parasitic power consumption, commercial scale

Procedia PDF Downloads 141