Search results for: sulfuric acid attacks
3845 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey
Authors: Priti Kumari, Tricha Anjali
Abstract:
Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys
Procedia PDF Downloads 3623844 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm
Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi
Abstract:
The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt
Procedia PDF Downloads 2343843 Microwave Assisted Extraction (MAE) of Castor Oil from Castor Bean
Authors: Ghazi Faisal Najmuldeen, Rosli Mohd Yunus, Nurfarahin Bt Harun, Mardhiana Binti Ismail
Abstract:
The microwave extraction has attracted great interest among the researchers. The main virtue of the microwave technique is cost-effective, time saving and simple handling procedure. Castor beans was chosen because of its high content in fatty acid, especially ricinoleic acid. The purpose of this research is to extract the castor oil by using the microwave assisted extraction (MAE) using ethanol as solvent and to investigate the influence of extraction time on castor oil yield and to characterize the main composition of the produced castor oil by using the GC-MS. It was found that there is a direct dependence between the oil yield and the time of extraction as it increases from 45% to 58% as the time increase from 10 min to 60 min. The major components of castor oil detected by GC-MS were ricinoleic acid, linoleic acid and oleic acid.Keywords: microwave assisted extraction (MAE), castor oil, ricinoleic acid, linoleic acid
Procedia PDF Downloads 5033842 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 3023841 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review
Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi
Abstract:
Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.Keywords: phishing, cybersecurity, cyber threat, social engineering, vision 2030
Procedia PDF Downloads 603840 Mineralogical Characteristics of Phosphates from the Djebel Onk Deposits: Treatment and Valorization of Co-Products
Authors: Samira Tlili, Amina Grairia, Sihem Benayache, Saida Bouyegh, Sabrina Ladjama, Abdelmoumen Guedri
Abstract:
Phosphorites from Djebel Onk Tebessa/Algeria deposit contain a CaO of 50-52 wt. % and P₂O₅ level of ≥ 30.20 wt. %. The microstructure revealed using a spectroscopy electronic microscope (SEM) consists of phosphate granules with an ovular form. In this investigation, we have identified phosphate with varying particle sizes using mineralogical methods. The phosphogypsum formed by the mineralization of natural phosphate has also been discovered. This co-product was formed during the attack on natural phosphates by sulfuric acid. This study demonstrated the effectiveness of the thermoanalytical technique of differential scanning calorimetry (DSC), X-ray diffraction, and EDS/MEB analysis. FTIR analyses also validated the identification of mineral phases with the observation of bands from structural phosphate groups.Keywords: phosphate, Djebel Onk deposit, mineralogy, valorization, phosphogypsum
Procedia PDF Downloads 213839 Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks
Authors: Parul Khanna, Pavol Zavarsky, Dale Lindskog
Abstract:
Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password cracking methods, social engineering tools and other sources of publicly displayed information. The main purpose of doxing attacks is to threaten, embarrass, harass and humiliate the organization or individual. Various tools are used to perform doxing. Tools such as Maltego visualize organization’s architecture which helps in determining weak links within the organization. This paper discusses limitations of Maltego Chlorine CE 3.6.0 and suggests measures as to how organizations can use these tools to protect themselves from doxing attacks.Keywords: advanced persistent threat, FOCA, OSINT, PII
Procedia PDF Downloads 2563838 Ensuring Cyber Security Using Kippo Honeypots
Authors: S. Vivekananda Pandian
Abstract:
A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.Keywords: attackers, security, Kippo Honeypots, virtual machine
Procedia PDF Downloads 4273837 Durability Performances of Epoxy Resin/TiO₂ Composited Alkali-Activated Slag/Fly Ash Pastes in Phosphoric Acid Solution
Abstract:
Laden with phosphates at a low pH value, sewage wastewater aggressive environments constitute a great threat to concrete-based pipes which is made of alkaline cementitious materials such as ordinary Portland cement (OPC). As a promising alternative for OPC-based binders, alkali-activated slag/fly ash (AASF) cementitious binders are generally believed to gain similar or better properties compared to OPC-based counterparts, especially durability. However, there is limited research on the performance of AASF binders in phosphoric acid solution. Moreover, the behavior of AASF binders composited with epoxy resin/TiO₂ when exposed to acidic media has been rarely explored. In this study, the performance of AASF paste with the precursor slag:fly ash (50:50 in mass ratio) enhanced with epoxy resin/TiO₂ composite in phosphoric acid solution (pH = 3.0-4.0) was investigated. The exposure towards acid attack lasted for 90 days. The same AASF mixture without resin/TiO₂ composite was used as a reference. The compressive strength and porous-related properties prior to acidic immersion were tested. The mass variations and degradation depth of the two mixtures of binders were also monitored which is based on phenolphthalein-videomicroscope method. The results show that the binder with epoxy resin/TiO₂ addition gained a higher compressive strength and lower water absorption than the reference. In addition, it also displayed a higher resistance towards acid attack indicated by a less mass loss and less degradation depth compared to the control sample. This improvement can be attributed to a dense microstructure evidenced by the higher compressive strength and related porous structures. It can be concluded that the microstructure can be improved by adding epoxy resin/TiO₂ composite in order to enhance the resistance of AASF binder towards acid attacks.Keywords: alkali-activated paste, epoxy resin/TiO₂, composites, mechanical properties, phosphoric acid
Procedia PDF Downloads 1213836 Environmental Performance of Different Lab Scale Chromium Removal Processes
Authors: Chiao-Cheng Huang, Pei-Te Chiueh, Ya-Hsuan Liou
Abstract:
Chromium-contaminated wastewater from electroplating industrial activity has been a long-standing environmental issue, as it can degrade surface water quality and is harmful to soil ecosystems. The traditional method of treating chromium-contaminated wastewater has been to use chemical coagulation processes. However, this method consumes large amounts of chemicals such as sulfuric acid, sodium hydroxide, and sodium bicarbonate in order to remove chromium. However, a series of new methods for treating chromium-containing wastewater have been developed. This study aimed to compare the environmental impact of four different lab scale chromium removal processes: 1.) chemical coagulation process (the most common and traditional method), in which sodium metabisulfite was used as reductant, 2.) electrochemical process using two steel sheets as electrodes, 3.) reduction by iron-copper bimetallic powder, and 4.) photocatalysis process by TiO2. Each process was run in the lab, and was able to achieve 100% removal of chromium in solution. Then a Life Cycle Assessment (LCA) study was conducted based on the experimental data obtained from four different case studies to identify the environmentally preferable alternative to treat chromium wastewater. The model used for calculating the environmental impact was TRACi, and the system scope includes the production phase and use phase of chemicals and electricity consumed by the chromium removal processes, as well as the final disposal of chromium containing sludge. The functional unit chosen in this study was the removal of 1 mg of chromium. Solution volume of each case study was adjusted to 1 L in advance and the chemicals and energy consumed were proportionally adjusted. The emissions and resources consumed were identified and characterized into 15 categories of midpoint impacts. The impact assessment results show that the human ecotoxicity category accounts for 55 % of environmental impact in Case 1, which can be attributed to the sulfuric acid used for pH adjustment. In Case 2, production of steel sheet electrodes is an energy-intensive process, thus contributed to 20 % of environmental impact. In Case 3, sodium bicarbonate is used as an anti-corrosion additive, which results mainly in 1.02E-05 Comparative Toxicity Unit (CTU) in the human toxicity category and 0.54E-05 (CTU) in acidification of air. In Case 4, electricity consumption for power supply of UV lamp gives 5.25E-05 (CTU) in human toxicity category, 1.15E-05 (kg Neq) in eutrophication. In conclusion, Case 3 and Case 4 have higher environmental impacts than Case 1 and Case 2, which can be attributed mostly to higher energy and chemical consumption, leading to high impacts in the global warming and ecotoxicity categories.Keywords: chromium, lab scale, life cycle assessment, wastewater
Procedia PDF Downloads 2653835 Countering Terrorism and Defending Human Right after 9/11: The European Perspective
Authors: Anita Blagojević
Abstract:
It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights
Procedia PDF Downloads 3783834 Nanofibrous Ion Exchangers
Authors: Jaromír Marek, Jakub Wiener, Yan Wang
Abstract:
The main goal of this study was to find simple and industrially applicable production of ion exchangers based on nanofibrous polystyrene matrix and characterization of prepared material. Starting polystyrene nanofibers were sulfonated and crosslinked under appropriate conditions at the same time by sulfuric acid. Strongly acidic cation exchanger was obtained in such a way. The polymer matrix was made from polystyrene nanofibers prepared by Nanospider technology. Various types postpolymerization reactions and other methods of crosslinking were studied. Greatly different behavior between nano and microsize materials was observed. The final nanofibrous material was characterized and compared to common granular ion exchangers and available microfibrous ion exchangers. The sorption properties of nanofibrous ion exchangers were compared with the granular ion exchangers. For nanofibrous ion exchangers of comparable ion exchange capacity was observed considerably faster adsorption kinetics.Keywords: electrospinning, ion exchangers, nanofibers, polystyrene
Procedia PDF Downloads 2563833 Protective Effect of Protocatechuic Acid Alone and in Combination with Ascorbic Acid in Aniline Hydrochloride Induced Spleen Toxicity in Rats
Authors: Aman Upaganlawar, Upasana Khairnar, Chandrashekhar Upasani
Abstract:
The present study was designed to evaluate the protective effects of protocatechuic acid alone and in combination with ascorbic acid in aniline hydrochloride-induced spleen toxicity in rats. Male Wistar rats of either sex (200-250g) were used and divided into different groups. Spleen toxicity was induced by aniline hydrochloride (100 ppm) in drinking water for 28 days. Treatment group received protocatechuic acid (40 mg/kg/day, p.o), ascorbic acid (40 mg/kg/day, p.o), and combination of protocatechuic acid (20 mg/kg/day, p.o) and ascorbic acid (20 mg/kg/day, p.o) followed by aniline hydrochloride. At the end of treatment period, serum and tissue parameters were evaluated. Rats supplemented with aniline hydrochloride showed a significant alteration in body weight, spleen weight, feed consumption, water intake, hematological parameters (Hemoglobin content, Red Blood Cells, White Blood Cells and Total iron content), tissue parameters (Lipid peroxidation, Reduced glutathione, Nitric oxide content) compared to control group. Histopathology of aniline hydrochloride-induced spleen showed significant damage compared to control rats. Treatment with Protocatechuic acid along with ascorbic acid showed better protection as compared to protocatechuic acid or ascorbic acid alone in aniline hydrochloride-induced spleen toxicity. In conclusion Treatment with protocatechuic acid and ascorbic acid in combination showed significant protection in aniline hydrochloride-induced splenic toxicity in rats.Keywords: aniline, spleen toxicity, protocatechuic acid, ascorbic acid, antioxidants
Procedia PDF Downloads 3563832 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022
Authors: Mojtaba Fayaz, Richard Hallal
Abstract:
This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks
Procedia PDF Downloads 1163831 The Effect of Acid Treatment of PEDOT: PSS Anode for Organic Solar Cells
Authors: Ismail Borazan, Ayse Celik Bedeloglu, Ali Demir, David Carroll
Abstract:
In this project, PEDOT:PSS layer was treated with formic acid, sulphuric acid, and hydrochloric acid, methanol, acetone, and dichlorobenzene:methanol. The resistivity measurements with 2-probes were carried out and the best-chosen method was employed to make an organic solar cell device.Keywords: organic solar cells, PEDOT:PSS, polymer electrodes, resistivity
Procedia PDF Downloads 8143830 Influence and Interaction of Temperature, H2S and pH on Concrete Sewer Pipe Corrosion
Authors: Anna Romanova, Mojtaba Mahmoodian, Morteza A. Alani
Abstract:
Concrete sewer pipes are known to suffer from a process of hydrogen sulfide gas induced sulfuric acid corrosion. This leads to premature pipe degradation, performance failure and collapses which in turn may lead to property and health damage. The above work reports on a field study undertaken in working sewer manholes where the parameters of effluent temperature and pH as well as ambient temperature and concentration of hydrogen sulfide were continuously measured over a period of two months. Early results suggest that effluent pH has no direct effect on hydrogen sulfide build up; on average the effluent temperature is 3.5°C greater than the ambient temperature inside the manhole and also it was observed that hydrogen sulfate concentration increases with increasing temperature.Keywords: concrete corrosion, hydrogen sulfide gas, temperature, sewer pipe
Procedia PDF Downloads 5723829 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things
Authors: James Kaweesa
Abstract:
The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.Keywords: cyber-threats, iot, intrusion detection system, networks
Procedia PDF Downloads 803828 Active Cyber Defense within the Concept of NATO’s Protection of Critical Infrastructures
Authors: Serkan Yağlı, Selçuk Dal
Abstract:
Cyber-attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber-attacks and their more complicated methods have created a new concept: active cyber defence (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defence. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defence, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.Keywords: active cyber defence, advanced persistent treat, critical infrastructure, NATO
Procedia PDF Downloads 2433827 Characteristics of a Dye-Entrapped Polypyrrole Film Prepared in the Presence of a Different Dye
Authors: M. Mominul Haque, Danny KY. Wong
Abstract:
In this paper, we will demonstrate the feasibility of selectively removing the azo dye, Acid Red 1, in the presence of a second dye, Indigo Carmine, at conducting polypyrrole films. A long-term goal of this work is to develop an efficient and effective electrochemical treatment of textile effluents that does not yield any toxic by-products. Specifically, pyrrole was initially electrochemically oxidised in the presence of Acid Red 1 to prepare an Acid Red 1-entrapped polypyrrole film. Next, the Acid Red 1 entrapped film was electrochemically reduced to expel the dye from the film. The film was then ready for use in removing the dye in an Acid Red 1 solution. The entrapment efficiency of the film was then studied by spectroscopically determining the change in the absorbance of the dye solution. These experiments were repeated using Indigo Carmine or a mixture of Acid Red 1 and Indigo Carmine, in place of Acid Red 1. Therefore, this has given rise to an environmentally friendly treatment method for textile effluents. In our work, we have also studied the characteristics of Acid Red 1- and Indigo Carmine-entrapped polypyrrole films by scanning electron microscopy, X-ray diffraction and Fourier transfer infrared spectroscopy.Keywords: azo dye, electrochemical treatment, polypyrrole, Acid Red 1
Procedia PDF Downloads 4073826 Quality Rabbit Skin Gelatin with Acetic Acid Extract
Authors: Wehandaka Pancapalaga
Abstract:
This study aimed to analyze the water content, yield, fat content, protein content, viscosity, gel strength, pH, melting and organoleptic rabbit skin gelatin with acetic acid extraction levels are different. The materials used in this study were Rex rabbit skin male. Treatments that P1 = the extraction of acetic acid 2% (v / v); P2 = the extraction of acetic acid 3% (v / v); P3 = the extraction of acetic acid 4 % (v / v). P5 = the extraction of acetic acid 5% (v / v). The results showed that the greater the concentration of acetic acid as the extraction of rabbit skin can reduce the water content and fat content of rabbit skin gelatin but increase the protein content, viscosity, pH, gel strength, yield and melting point rabbit skin gelatin. texture, color and smell of gelatin rabbits there were no differences with cow skin gelatin. The results showed that the quality of rabbit skin gelatin accordance Indonesian National Standard (SNI). Conclusion 5% acetic acid extraction produces the best quality gelatin.Keywords: gelatin, skin rabbit, acetic acid extraction, quality
Procedia PDF Downloads 4173825 Isolation, Characterization and Biological Activities of Compounds Isolated from Callicarpa maingayi
Authors: Muhammad A. Ado, Intan S. Ismail, Hasanah M. Ghazali, Faridah Abas
Abstract:
In this study, we have investigated the phytochemical constituents of soluble fractions of dichloromethane (DCM) of methanolic leaves extract of the Callicarpa maingayi. The phytochemicals investigation has resulted in the isolation of three triterpenoids (euscaphic acid (1), arjunic acid (2), and ursolic acid (3)) together with two flavones apigenin (4) and acacetin (5)), two phytosterols (stigmasterol 3-O-β-glycopyranoside (6) and sitosterol 3-O-β-glycopyranoside (7)), and one fatty acid (n-hexacosanoic acid (8)). Six (6) compounds isolated from this species were isolated for the first time (1, 2, 3, 4, 5, and 8). Their structures were elucidated and identified by spectral methods of one and two-dimensional NMR techniques, gas chromatography-mass spectrometry, and comparison with the previously reported literature. The biological activity of three compounds (1-3) was carried out on acetylcholinesterase inhibition activity. Compound (3) was found to displayed good inhibition against AChE with an IC₅₀ value of 21.5 ± 0.022 μM.Keywords: acetylcholinesterase, Callicarpa maingayi, euscaphic acid, ursolic acid
Procedia PDF Downloads 1463824 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 3973823 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques
Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari
Abstract:
Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.Keywords: data mining, counter terrorism, machine learning, SVM
Procedia PDF Downloads 4083822 Application of Deep Eutectic Solvent in the Extraction of Ferulic Acid from Palm Pressed Fibre
Authors: Ng Mei Han, Nu'man Abdul Hadi
Abstract:
Extraction of ferulic acid from palm pressed fiber using deep eutectic solvent (DES) of choline chloride-acetic acid (ChCl-AA) and choline chloride-citric acid (ChCl-CA) are reported. Influence of water content in DES on the extraction efficiency was investigated. ChCl-AA and ChCl-CA experienced a drop in viscosity from 9.678 to 1.429 and 22.658 ± 1.655 mm2/s, respectively as the water content in the DES increased from 0 to 50 wt% which contributed to higher extraction efficiency for the ferulic acid. Between 41,155 ± 940 mg/kg ferulic acid was obtained after 6 h reflux when ChCl-AA with 30 wt% water was used for the extraction compared to 30,940 ± 621 mg/kg when neat ChCl-AA was used. Although viscosity of the DES could be improved with the addition of water, there is a threshold where the DES could tolerate the presence of water without changing its solvent behavior. The optimum condition for extraction of ferulic acid from palm pressed fiber was heating for 6 h with DES containing 30 wt% water.Keywords: deep eutectic solvent, extraction, ferulic acid, palm fibre
Procedia PDF Downloads 823821 A Blind Three-Dimensional Meshes Watermarking Using the Interquartile Range
Authors: Emad E. Abdallah, Alaa E. Abdallah, Bajes Y. Alskarnah
Abstract:
We introduce a robust three-dimensional watermarking algorithm for copyright protection and indexing. The basic idea behind our technique is to measure the interquartile range or the spread of the 3D model vertices. The algorithm starts by converting all the vertices to spherical coordinate followed by partitioning them into small groups. The proposed algorithm is slightly altering the interquartile range distribution of the small groups based on predefined watermark. The experimental results on several 3D meshes prove perceptual invisibility and the robustness of the proposed technique against the most common attacks including compression, noise, smoothing, scaling, rotation as well as combinations of these attacks.Keywords: watermarking, three-dimensional models, perceptual invisibility, interquartile range, 3D attacks
Procedia PDF Downloads 4743820 Constructing White-Box Implementations Based on Threshold Shares and Composite Fields
Authors: Tingting Lin, Manfred von Willich, Dafu Lou, Phil Eisen
Abstract:
A white-box implementation of a cryptographic algorithm is a software implementation intended to resist extraction of the secret key by an adversary. To date, most of the white-box techniques are used to protect block cipher implementations. However, a large proportion of the white-box implementations are proven to be vulnerable to affine equivalence attacks and other algebraic attacks, as well as differential computation analysis (DCA). In this paper, we identify a class of block ciphers for which we propose a method of constructing white-box implementations. Our method is based on threshold implementations and operations in composite fields. The resulting implementations consist of lookup tables and few exclusive OR operations. All intermediate values (inputs and outputs of the lookup tables) are masked. The threshold implementation makes the distribution of the masked values uniform and independent of the original inputs, and the operations in composite fields reduce the size of the lookup tables. The white-box implementations can provide resistance against algebraic attacks and DCA-like attacks.Keywords: white-box, block cipher, composite field, threshold implementation
Procedia PDF Downloads 1683819 Synthesis, Characterization, and Application of Some Acid Dyes Derived from 1-Amino-4 Bromo-Anthraquine-2-Sulphonic Acid
Authors: Nuradeen Abdullahi Nadabo, Kasali Adewale Bello, Istifanus Chindo, Nurudeen Ayeni
Abstract:
Ten acid dyes were synthesized from 1-amino-4-bromo anthraghinone-2 sulphuric acid by condensation with different substituted amilines. These dyes were characterized by IR Spectroscopy and the results revealed an incorporation of various substituents. Application of these dyes were carried out on Nylon and wool fabrics using standard procedure melting point, percentage yield, molar extinction coefficient, wash, light and staining of adjacent fibre, of these dyes were also evaluated and the results obtained are within a reasonable range acceptable for commercial dyes.Keywords: acid dyes, dyeing, exhaustion, extinction co-efficient
Procedia PDF Downloads 3453818 SEC-MALLS Study of Hyaluronic Acid and BSA Thermal Degradation in Powder and in Solution
Authors: Vasile Simulescu, Jakub Mondek, Miloslav Pekař
Abstract:
Hyaluronic acid (HA) is an anionic glycosaminoglycan distributed throughout connective, epithelial and neural tissues. The importance of hyaluronic acid increased in the last decades. It has many applications in medicine and cosmetics. Hyaluronic acid has been used in attempts to treat osteoarthritis of the knee via injecting it into the joint. Bovine serum albumin (also known as BSA) is a protein derived from cows, which has many biochemical applications. The aim of our research work was to compare the thermal degradation of hyaluronic acid and BSA in powder and in solution, by determining changes in molar mass and conformation, by using SEC-MALLS (size exclusion chromatography -multi angle laser light scattering). The aim of our research work was to observe the degradation in powder and in solution of different molar mass hyaluronic acid samples, at different temperatures for certain periods. The degradation of the analyzed samples was mainly observed by modifications in molar mass.Keywords: thermal degradation, hyaluronic acid, BSA, SEC-MALLS
Procedia PDF Downloads 5053817 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection
Procedia PDF Downloads 1583816 American Criminal Justice Responses to Terrorism in the Post 9/11 Era
Authors: Summer Jackson
Abstract:
September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.Keywords: terrorism, law enforcement, post-9/11, federal policy
Procedia PDF Downloads 119