Search results for: salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1265

Search results for: salt and peppers attacks

1115 Influence Study of the Molar Ratio between Solvent and Initiator on the Reaction Rate of Polyether Polyols Synthesis

Authors: María José Carrero, Ana M. Borreguero, Juan F. Rodríguez, María M. Velencoso, Ángel Serrano, María Jesús Ramos

Abstract:

Flame-retardants are incorporated in different materials in order to reduce the risk of fire, either by providing increased resistance to ignition, or by acting to slow down combustion and thereby delay the spread of flames. In this work, polyether polyols with fire retardant properties were synthesized due to their wide application in the polyurethanes formulation. The combustion of polyurethanes is primarily dependent on the thermal properties of the polymer, the presence of impurities and formulation residue in the polymer as well as the supply of oxygen. There are many types of flame retardants, most of them are phosphorous compounds of different nature and functionality. The addition of these compounds is the most common method for the incorporation of flame retardant properties. The employment of glycerol phosphate sodium salt as initiator for the polyol synthesis allows obtaining polyols with phosphate groups in their structure. However, some of the critical points of the use of glycerol phosphate salt are: the lower reactivity of the salt and the necessity of a solvent (dimethyl sulfoxide, DMSO). Thus, the main aim in the present work was to determine the amount of the solvent needed to get a good solubility of the initiator salt. Although the anionic polymerization mechanism of polyether formation is well known, it seems convenient to clarify the role that DMSO plays at the starting point of the polymerization process. Regarding the fact that the catalyst deprotonizes the hydroxyl groups of the initiator and as a result of this, two water molecules and glycerol phosphate alkoxide are formed. This alkoxide, together with DMSO, has to form a homogeneous mixture where the initiator (solid) and the propylene oxide (PO) are soluble enough to mutually interact. The addition rate of PO increased when the solvent/initiator ratios studied were increased, observing that it also made the initiation step shorter. Furthermore, the molecular weight of the polyol decreased when higher solvent/initiator ratios were used, what revealed that more amount of salt was activated, initiating more chains of lower length but allowing to react more phosphate molecules and to increase the percentage of phosphorous in the final polyol. However, the final phosphorous content was lower than the theoretical one because only a percentage of salt was activated. On the other hand, glycerol phosphate disodium salt was still partially insoluble in DMSO studied proportions, thus, the recovery and reuse of this part of the salt for the synthesis of new flame retardant polyols was evaluated. In the recovered salt case, the rate of addition of PO remained the same than in the commercial salt but a shorter induction period was observed, this is because the recovered salt presents a higher amount of deprotonated hydroxyl groups. Besides, according to molecular weight, polydispersity index, FT-IR spectrum and thermal stability, there were no differences between both synthesized polyols. Thus, it is possible to use the recovered glycerol phosphate disodium salt in the same way that the commercial one.

Keywords: DMSO, fire retardants, glycerol phosphate disodium salt, recovered initiator, solvent

Procedia PDF Downloads 253
1114 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 184
1113 Bread-Making Properties of Rice Flour Dough Using Fatty Acid Salt

Authors: T. Hamaishi, Y. Morinaga, H. Morita

Abstract:

Introduction: Rice consumption in Japan has decreased, and Japanese government has recommended use of rice flour in order to expand the consumption of rice. There are two major protein components present in flour, called gliadin and glutenin. Gluten forms when water is added to flour and is mixed. As mixing continues, glutenin interacts with gliadin to form viscoelastic matrix of gluten. Rice flour bread does not expand as much as wheat flour bread. Because rice flour is not included gluten, it cannot construct gluten network in the dough. In recent years, some food additives have been used for dough-improving agent in bread making, especially surfactants has effect in order to improve dough extensibility. Therefore, we focused to fatty acid salt which is one of anionic surfactants. Fatty acid salt is a salt consist of fatty acid and alkali, it is main components of soap. According to JECFA(FAO/WHO Joint Expert Committee on Food Additives), salts of Myristic(C14), Palmitic(C16) and Stearic(C18) could be used as food additive. They have been evaluated ADI was not specified. In this study, we investigated to improving bread-making properties of rice flour dough adding fatty acid salt. Materials and methods: The sample of fatty acid salt is myristic (C14) dissolved in KOH solution to a concentration of 350 mM and pH 10.5. Rice dough was consisted of 100 g of flour using rice flour and wheat gluten, 5 g of sugar, 1.7 g of salt, 1.7g of dry yeast, 80 mL of water and fatty acid salt. Mixing was performed for 500 times by using hand. The concentration of C14K in the dough was 10 % relative to flour weight. Amount of gluten in the dough was 20 %, 30 % relative to flour weight. Dough expansion ability test was performed to measure physical property of bread dough according to the methods of Baker’s Yeast by Japan Yeast Industry Association. In this test, 150 g of dough was filled from bottom of the cylinder and fermented at 30 °C,85 % humidity for 120 min on an incubator. The height of the expansion in the dough was measured and determined its expansion ability. Results and Conclusion: Expansion ability of rice dough with gluten content of 20 %, 30% showed 316 mL, 341 mL for 120 min. When C14K adding to the rice dough, dough expansion abilities were 314 mL, 368 mL for 120 min, there was no significant difference. Conventionally it has been known that the rice flour dough contain gluten of 20 %. The considerable improvement of dough expansion ability was achieved when added C14K to wheat flour. The experimental result shows that c14k adding to the rice dough with gluten content more than 20 % was not improving bread-making properties. In conclusion, rice bread made with gluten content more than 20 % without C14K has been suggested to contribute to the formation of the sufficient gluten network.

Keywords: expansion ability, fatty acid salt, gluten, rice flour dough

Procedia PDF Downloads 225
1112 The Failed Criminalization of Homelessness: The Need for New Interventions and the Implementation of Salt Lake City’s Kayak Court

Authors: Stephen Fanale

Abstract:

Criminalization creates sizable barriers to housing and perpetuates the cycle of homelessness. Not only does criminalization leave people on the streets and in shelters indefinitely, but it also unnecessarily costs the taxpayers. Homelessness is a growing issue throughout the world, and criminalizing these human beings is a violation of basic human rights. While this may seem like an insurmountable obstacle, there is something that can be done while fighting that battle. While they are under-researched as a whole, specialty courts, specifically homeless courts, are a growing vessel that can address some of the barriers associated with the criminalization of homelessness. They divert individuals away from jail while connecting them to services that will help their situation instead of hindering it. The model being used in Salt Lake City, while similar to others throughout the United States, stands alone in its outreach efforts and should be paving the way for the rest of the world. The following will look at criminalization and different ways of addressing it, and, finally, Salt Lake City’s current operations, including the unique outreach court: Kayak Court.

Keywords: barriers to housing, criminalization, cycle of homelessness, homeless court, diversion, kayak court

Procedia PDF Downloads 44
1111 Remote Sensing and GIS Based Methodology for Identification of Low Crop Productivity in Gautam Buddha Nagar District

Authors: Shivangi Somvanshi

Abstract:

Poor crop productivity in salt-affected environment in the country is due to insufficient and untimely canal supply to agricultural land and inefficient field water management practices. This could further degrade due to inadequate maintenance of canal network, ongoing secondary soil salinization and waterlogging, worsening of groundwater quality. Large patches of low productivity in irrigation commands are occurring due to waterlogging and salt-affected soil, particularly in the scarcity rainfall year. Satellite remote sensing has been used for mapping of areas of low crop productivity, waterlogging and salt in irrigation commands. The spatial results obtained for these problems so far are less reliable for further use due to rapid change in soil quality parameters over the years. The existing spatial databases of canal network and flow data, groundwater quality and salt-affected soil were obtained from the central and state line departments/agencies and were integrated with GIS. Therefore, an integrated methodology based on remote sensing and GIS has been developed in ArcGIS environment on the basis of canal supply status, groundwater quality, salt-affected soils, and satellite-derived vegetation index (NDVI), salinity index (NDSI) and waterlogging index (NSWI). This methodology was tested for identification and delineation of area of low productivity in the Gautam Buddha Nagar district (Uttar Pradesh). It was found that the area affected by this problem lies mainly in Dankaur and Jewar blocks of the district. The problem area was verified with ground data and was found to be approximately 78% accurate. The methodology has potential to be used in other irrigation commands in the country to obtain reliable spatial data on low crop productivity.

Keywords: remote sensing, GIS, salt affected soil, crop productivity, Gautam Buddha Nagar

Procedia PDF Downloads 265
1110 Analysis of Brain Signals Using Neural Networks Optimized by Co-Evolution Algorithms

Authors: Zahra Abdolkarimi, Naser Zourikalatehsamad,

Abstract:

Up to 40 years ago, after recognition of epilepsy, it was generally believed that these attacks occurred randomly and suddenly. However, thanks to the advance of mathematics and engineering, such attacks can be predicted within a few minutes or hours. In this way, various algorithms for long-term prediction of the time and frequency of the first attack are presented. In this paper, by considering the nonlinear nature of brain signals and dynamic recorded brain signals, ANFIS model is presented to predict the brain signals, since according to physiologic structure of the onset of attacks, more complex neural structures can better model the signal during attacks. Contribution of this work is the co-evolution algorithm for optimization of ANFIS network parameters. Our objective is to predict brain signals based on time series obtained from brain signals of the people suffering from epilepsy using ANFIS. Results reveal that compared to other methods, this method has less sensitivity to uncertainties such as presence of noise and interruption in recorded signals of the brain as well as more accuracy. Long-term prediction capacity of the model illustrates the usage of planted systems for warning medication and preventing brain signals.

Keywords: co-evolution algorithms, brain signals, time series, neural networks, ANFIS model, physiologic structure, time prediction, epilepsy suffering, illustrates model

Procedia PDF Downloads 250
1109 Evaluation of Living Mulches Effectiveness in Weed Suppression, and Seed Yield of Black cumin (Nigella sativa L.) Under Salt Stress

Authors: Fatemeh Benakashani, Hossein Tavakoli, Elias Soltani

Abstract:

To ensure the sustainability of crop cultivation and rural economies, it is imperative that we focus on cultivating resilient crops capable of withstanding salt stress. However, the effective management of weeds in salt-affected soils remains a significant challenge. This study investigates the impact of living mulches, specifically Berseem clover (Trifolium alexandrinum) and Barley (Hordeum vulgare), on weed control, as well as the quality and yield of Black cumin (Nigella sativa) in salt-affected soil. In our research, we employed a two-fold mowing strategy for the living mulches: once following crop establishment and once before the flowering stage. Notably, the weed-free plots demonstrated Black cumin's seed yield, and oil content (31.1% to 34.3%), consistent with previous studies, highlighting its potential for the reclamation and utilization of salt-affected lands. However, Black cumin exhibited limited competitiveness against prevalent weeds in the field, such as Amaranthus retroflexus, Chenopodium album, and Portulaca oleracea, which significantly diminished both the 1000 grain mass in plots where weeds were present. Interestingly, the introduction of living mulches led to improvements in seed yield and seed oil content when compared to both weed-free and weed-infested plots. Notably, Berseem clover exhibited greater biomass than Barley, indicating its heightened competitiveness against weeds. Nevertheless, it's worth noting that in the long term, Berseem clover also competed with the main crop, thereby limiting overall productivity. Consequently, we recommend relocating the Berseem clover living mulch following the establishment of Black cumin as a strategy for weed management in Black cumin fields situated in salt-affected soils.

Keywords: weed management, competition, clover, barley, medicinal plant

Procedia PDF Downloads 36
1108 The Effect of Internal Electrical Ion Mobility on Molten Salts through Atomistic Simulations

Authors: Carlos F. Sanz-Navarro, Sonia Fereres

Abstract:

Binary and ternary mixtures of molten salts are excellent thermal energy storage systems and have been widely used in commercial tanks both in nuclear and solar thermal applications. However, the energy density of the commercially used mixtures is still insufficient, and therefore, new systems based on latent heat storage (or phase change materials, PCM) are currently being investigated. In order to shed some light on the macroscopic physical properties of the molten salt phases, knowledge of the microscopic structure and dynamics is required. Several molecular dynamics (MD) simulations have been performed to model the thermal behavior of (Li,K)2CO3 mixtures. Up to this date, this particular molten salt mixture has not been extensively studied but it is of fundamental interest for understanding the behavior of other commercial salts. Molten salt diffusivities, the internal electrical ion mobility, and the physical properties of the solid-liquid phase transition have been calculated and compared to available data from literature. The effect of anion polarization and the application of a strong external electric field have also been investigated. The influence of electrical ion mobility on local composition is explained through the Chemla effect, well known in electrochemistry. These results open a new way to design optimal high temperature energy storage materials.

Keywords: atomistic simulations, thermal storage, latent heat, molten salt, ion mobility

Procedia PDF Downloads 306
1107 Numerical Modeling of a Molten Salt Power Tower Configuration Adaptable for Harsh Winter Climate

Authors: Huiqiang Yang, Domingo Santana

Abstract:

This paper proposes a novel configuration which introduces a natural draft dry cooling tower system in a molten salt power tower. A three-dimensional numerical modeling was developed based on the novel configuration. A plan of building 20 new concentrating solar power plants has been announced by Chinese government in September 2016, and among these 20 new plants, most of them are located in regions with long winter and harsh winter climate. The innovative configuration proposed includes an external receiver concrete tower at the center, a natural draft dry cooling tower which is surrounding the external receiver concrete tower and whose shell is fixed on the external receiver concrete tower, and a power block (including a steam generation system, a steam turbine system and hot/cold molten salt tanks, and water treatment systems) is covered by the roof of the natural draft dry cooling tower. Heat exchanger bundles are vertically installed at the furthest edge of the power block. In such a way, all power block equipment operates under suitable environmental conditions through whole year operation. The monthly performance of the novel configuration is simulated as compared to a standard one. The results show that the novel configuration is much more efficient in each separate month in a typical meteorological year. Moreover, all systems inside the power block have less thermal losses at low ambient temperatures, especially in harsh winter climate. It is also worthwhile mentioning that a photovoltaic power plant can be installed on the roof of the cooling tower to reduce the parasites of the molten salt power tower.

Keywords: molten salt power tower, natural draft dry cooling, commercial scale, power block, harsh winter climate

Procedia PDF Downloads 316
1106 Experimental Device to Test Corrosion Behavior of Materials in the Molten Salt Reactor Environment

Authors: Jana Petru, Marie Kudrnova

Abstract:

The use of technologies working with molten salts is conditioned by finding suitable construction materials that must meet several demanding criteria. In addition to temperature resistance, materials must also show corrosion resistance to salts; they must meet mechanical requirements and other requirements according to the area of use – for example, radiation resistance in Molten Salt Reactors. The present text describes an experimental device for studying the corrosion resistance of candidate materials in molten mixtures of salts and is a partial task of the international project ADAR, dealing with the evaluation of advanced nuclear reactors based on molten salts. The design of the device is based on a test exposure of Inconel 625 in the mixture of salts Hitec in a high temperature tube furnace. The result of the pre-exposure is, in addition to the metallographic evaluation of the behavior of material 625 in the mixture of nitrate salts, mainly a list of operational and construction problems that were essential for the construction of the new experimental equipment. The main output is a scheme of a newly designed gas-tight experimental apparatus capable of operating in an inert argon atmosphere, temperature up to 600 °C, pressure 3 bar, in the presence of a corrosive salt environment, with an exposure time of hundreds of hours. This device will enable the study of promising construction materials for nuclear energy.

Keywords: corrosion, experimental device, molten salt, steel

Procedia PDF Downloads 100
1105 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 173
1104 Prevalence of Endemic Goiter in School Children and Women of Reproductive Age Group during Post Salt Iodization Period in Andro Constituency, Imphal-East District, Manipur, India

Authors: Y. Suchitra Devi, L. Hemchandra Singh

Abstract:

Background: Because of its geographical location, Manipur lies in the conventional goiter endemic belt. During the post salt iodization period, endemic goiter was prevalent in the valley districts of Manipur without iodine deficiency. Objectives: The present study aim at the prevalence of goiter among school children (6-12 years) and women of reproductive age group (above 20 years) of Andro Assembly Constituency, Imphal- East, Manipur, India. Method: A total of 3992 individuals were clinically examined for thyroid enlargement. Hormones like TSH, FT₄, FT₃, and Anti-TPO, Anti-Tg were tested, UIC, USCN, testing of iodine in water and salt. Result: Total goiter prevalence was found to be 13.98%, median urinary iodine level was 166.0 µg/l, mean urinary thiocyanate concentration was 0.726 ± 0.408, mean water iodine concentration was 3.843 ± 2.291, and all the salt samples were above 15ppm. 6 out of 41 children and 93 out of 176 women were auto antibody positive. 41 children and 176 women were tested for TSH, FT₄, and FT₃, which shows disturbance in hormone level. Conclusion: The present study showed that the region is mildly goiter endemic without biochemical iodine deficiency.

Keywords: goiter, TSH, FT₄, FT₃, anti-TPO, anti-Tg, UIC, USCN, school children and women of reproductive age

Procedia PDF Downloads 87
1103 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 47
1102 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 16
1101 'Propaganda by the Deed', 'Armed Propaganda' and Mass Mobilization: The Missing Link in the Left-Wing Terrorist Thinking

Authors: Ersun N. Kurtulus

Abstract:

One of the strategic goals of left-wing terrorism, both in its Anarchist and Marxist-Leninist forms, was mobilization of masses as a first step in launching a revolution. However, in the canonical texts of left-wing terrorist literature (such as the works of Brousse, Nachaev, Bakunin, Kropotkin, Most, Heinzen, Guevara and Marighella) it is not clear how resort to terrorist tactics such as assassinations or bomb attacks will lead to mobilization of masses. This link is usually presumed and taken for granted. However, in other, less known terrorist texts, where there is some elaboration upon this link, two conflicting views emerge: (i) terrorist attacks are supposed to cause state repression which in turn radicalizes masses and opens up the way for recruitment and mobilization versus (ii) terrorist attacks are supposed to demonstrate the hollowness of the already existent state repression and thereby encourage mobilization of masses that are already radicalized but inactive due fear caused by state repression. The paper argues that terrorism studies have largely overemphasized the former while the latter has remained more or less unnoticed.

Keywords: terrorism, repression, radical left, mobilization of masses

Procedia PDF Downloads 197
1100 Screening of Minimal Salt Media for Biosurfactant Production by Bacillus spp.

Authors: Y. M. Al-Wahaibi, S. N. Al-Bahry, A. E. Elshafie, A. S. Al-Bemani, S. J. Joshi, A. K. Al-Bahri

Abstract:

Crude oil is a major source of global energy. The major problem is its widespread use and demand resulted is in increasing environmental pollution. One associated pollution problem is ‘oil spills’. Oil spills can be remediated with the use of chemical dispersants, microbial biodegradation and microbial metabolites such as biosurfactants. Four different minimal salt media for biosurfactant production by Bacillus isolated from oil contaminated sites from Oman were screened. These minimal salt media were supplemented with either glucose or sucrose as a carbon source. Among the isolates, W16 and B30 produced the most active biosurfactants. Isolate W16 produced better biosurfactant than the rest, and reduced surface tension (ST) and interfacial tension (IFT) to 25.26mN/m and 2.29mN/m respectively within 48h which are characteristics for removal of oil in contaminated sites. Biosurfactant was produced in bulk and extracted using acid precipitation method. Thin Layer Chromatography (TLC) of acid precipitate biosurfactant revealed two concentrated bands. Further studies of W16 biosurfactant in bioremediation of oil spills are recommended.

Keywords: oil contamination, remediation, Bacillus spp, biosurfactant, surface tension, interfacial tension

Procedia PDF Downloads 241
1099 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 127
1098 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 357
1097 The Biofertilizer Effect of Pseudomonas of Salt Soils of the North-West Algerian, Study of Comportment of Bean (Vicia Faba)

Authors: Djoudi Abdelhak, Djibaoui Rachid, Reguieg Yassaad Houcine

Abstract:

Our study focuses on the identification of some species of Pseudomonas (P4, P5, P7 and P8) isolated from saline soils in northwestern Algeria and the effect of their metabolites on the growth of Alternaria alternata the causative agent of the blight of the bean disease (Vicia faba). We are also interested in stimulating the growth of this plant species in saline conditions (60 mM/l NaCl) and the absence of salts. The analysis focuses on rates of inhibition of mycelial growth of Alternaria alternata strain and the rate of growth of plants inoculated with strains of Pseudomonas expressed by biometrics. According to the results of the in-vitro test, P5 and P8 species and their metabolites showed a significant effect on mycelia growth and production of spores of Alternaria alternata. The in-vivo test shows that the species P8 and P5 were significantly and positively influencing the growth in biometric parameters of the bean in saline and salt-free condition. Inoculation with strain P5 has promoted the growth of the bean in stem height, stem fresh weight and dry weight of stems of 108.59%, 115.28%, 104.33%, respectively, in the presence of salt Inoculation with strain P5 has fostered the growth of the bean stem fresh weight of 112.47% in the presence of salt The effect of Pseudomonas species on the development of Vicia faba and the growth of Alternaria alternata is considering new techniques and methods of biological production and crop protection.

Keywords: pseudomonas, vicia faba, alternaria alternata, promoting of plant growth

Procedia PDF Downloads 369
1096 Sustainable Separation of Nicotine from Its Aqueous Solutions

Authors: Zoran Visak, Joana Lopes, Vesna Najdanovic-Visak

Abstract:

Within this study, the separation of nicotine from its aqueous solutions, using inorganic salt sodium chloride or ionic liquid (molten salt) ECOENG212® as salting-out media, was carried out. Thus, liquid-liquid equilibria of the ternary solutions (nicotine+water+NaCl) and (nicotine+water+ECOENG212®) were determined at ambient pressure, 0.1 MPa, at three temperatures. The related phase diagrams were constructed in two manners: by adding the determined cloud-points and by the chemical analysis of phases in equilibrium (tie-line data). The latter were used to calculate two important separation parameters - partition coefficients of nicotine and separation factors. The impacts of the initial compositions of the mother solutions and of temperature on the liquid-liquid phase separation and partition coefficients were analyzed and discussed. The results obtained clearly showed that both investigated salts are good salting-out media for the efficient and sustainable separation of nicotine from its solutions with water. However, when compared, sodium chloride exhibited much better separation performance than the ionic liquid.

Keywords: nicotine, liquid-liquid separation, inorganic salt, ionic liquid

Procedia PDF Downloads 285
1095 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 324
1094 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 327
1093 Tectono-Stratigraphic Architecture, Depositional Systems and Salt Tectonics to Strike-Slip Faulting in Kribi-Campo-Cameroon Atlantic Margin with an Unsupervised Machine Learning Approach (West African Margin)

Authors: Joseph Bertrand Iboum Kissaaka, Charles Fonyuy Ngum Tchioben, Paul Gustave Fowe Kwetche, Jeannette Ngo Elogan Ntem, Joseph Binyet Njebakal, Ribert Yvan Makosso-Tchapi, François Mvondo Owono, Marie Joseph Ntamak-Nida

Abstract:

Located in the Gulf of Guinea, the Kribi-Campo sub-basin belongs to the Aptian salt basins along the West African Margin. In this paper, we investigated the tectono-stratigraphic architecture of the basin, focusing on the role of salt tectonics and strike-slip faults along the Kribi Fracture Zone with implications for reservoir prediction. Using 2D seismic data and well data interpreted through sequence stratigraphy with integrated seismic attributes analysis with Python Programming and unsupervised Machine Learning, at least six second-order sequences, indicating three main stages of tectono-stratigraphic evolution, were determined: pre-salt syn-rift, post-salt rift climax and post-rift stages. The pre-salt syn-rift stage with KTS1 tectonosequence (Barremian-Aptian) reveals a transform rifting along NE-SW transfer faults associated with N-S to NNE-SSW syn-rift longitudinal faults bounding a NW-SE half-graben filled with alluvial to lacustrine-fan delta deposits. The post-salt rift-climax stage (Lower to Upper Cretaceous) includes two second-order tectonosequences (KTS2 and KTS3) associated with the salt tectonics and Campo High uplift. During the rift-climax stage, the growth of salt diapirs developed syncline withdrawal basins filled by early forced regression, mid transgressive and late normal regressive systems tracts. The early rift climax underlines some fine-grained hangingwall fans or delta deposits and coarse-grained fans from the footwall of fault scarps. The post-rift stage (Paleogene to Neogene) contains at least three main tectonosequences KTS4, KTS5 and KTS6-7. The first one developed some turbiditic lobe complexes considered as mass transport complexes and feeder channel-lobe complexes cutting the unstable shelf edge of the Campo High. The last two developed submarine Channel Complexes associated with lobes towards the southern part and braided delta to tidal channels towards the northern part of the Kribi-Campo sub-basin. The reservoir distribution in the Kribi-Campo sub-basin reveals some channels, fan lobes reservoirs and stacked channels reaching up to the polygonal fault systems.

Keywords: tectono-stratigraphic architecture, Kribi-Campo sub-basin, machine learning, pre-salt sequences, post-salt sequences

Procedia PDF Downloads 23
1092 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 145
1091 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids

Authors: Sami M. Alshareef

Abstract:

The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.

Keywords: machine learning, cyber-attacks, automatic generation control, smart grid

Procedia PDF Downloads 59
1090 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 615
1089 Structural and Electronic Properties of the Rock-salt BaxSr1−xS Alloys

Authors: B. Bahloul, K. Babesse, A. Dkhira, Y. Bahloul, L. Amirouche

Abstract:

Structural and electronic properties of the rock-salt BaxSr1−xS are calculated using the first-principles calculations based on the density functional theory (DFT) within the generalized gradient approximation (GGA), the local density approximation (LDA) and the virtual-crystal approximation (VCA). The calculated lattice parameters at equilibrium volume for x=0 and x=1 are in good agreement with the literature data. The BaxSr1−xS alloys are found to be an indirect band gap semiconductor. Moreoever, for the composition (x) ranging between [0-1], we think that our results are well discussed and well predicted.

Keywords: semiconductor, Ab initio calculations, rocksalt, band structure, BaxSr1−xS

Procedia PDF Downloads 370
1088 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 319
1087 Determination of Iodine and Heavy Metals in Two Brands of Iodised Salt

Authors: Z. O. Apotiola, J. F. Fashakin

Abstract:

A study was conducted to investigate the storage stability of Mr Chef and Annapurna salts. The salts were bought from Mile 12 market in Lagos State and were stored for a period of six months. The stability of the iodine content was then investigated by storing some at ambient temperature (24-30oC) and some at atmospheric temperature (21-35 oC), and from each storage condition, a sample each was taken every month to analyze for the iodine and moisture contents. The result shows that there was a significant difference between Mr Chef and the standard and Annapurna and the standard. The iodine content of Mr Chef stored at ambient and atmospheric temperature decreases progressively from 48.70±0.00-37.00±0.00 and 47.60±0.00-11.60±0.00 respectively. And that of Annapurna at both ambient and atmospheric temperature also decreases progressively from 47.60±0.00-36.60±0.00 and 47.60±0.00-10.60±0.00 respectively. Also, the moisture content of both salts at the zero month to the sixth month both at room temperature and atmospheric temperature increases from 1.11±0.00-1.70±0.00 and 1.11±0.00-2.40±0.00 respectively. The results of the heavy metals shows that only Copper, Zinc and Cobalt were detected at the first and the sixth month in both Mr Chef and Annapurna which ranges from 0.15±0.00-0.38±0.00 and 0.18±0.00 - 3.50±0.00 respectively. Hence, the stability of iodine in salt is influenced by the storage conditions it is subjected to and the length of time it is been stored.

Keywords: salt, iodine, stability, ambient, atmospheric temperature

Procedia PDF Downloads 546
1086 A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks

Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez

Abstract:

In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process.

Keywords: attacker, defender, game theory, information

Procedia PDF Downloads 435