Search results for: black hole attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1753

Search results for: black hole attack

1573 Behavioral and Electroantennographic Responses of the Tea Shot Hole Borer, Euwallacea fornicatus, Eichhoff (Scolytidae: Coleoptera) to Volatiles Compounds of Montanoa bipinnatifida (Compositae: Asteraceae) and Development of a Kairomone Trap

Authors: Sachin Paul James, Selvasundaram Rajagopal, Muraleedharan Nair, Babu Azariah

Abstract:

The shot hole borer (SHB), Euwallacea fornicatus (= Xyleborus fornicatus) (Scolytidae: Coleoptera) is one of the major pests of tea in southern India and Sri Lanka. The partially dried cut stem of a jungle plant, Montanoa bipinnatifida (C.Koch) (Compositae: Asteraceae) reported to attract shot hole borer beetles in the field. Collection, isolation, identification and quantification of the emitted volatiles from the partially dried cut stems of M. bipinnatifida using dynamic head space and GC-MS revealed the presence of seven compounds viz. α- pinene, β- phellandrene, β - pinene, D- limonene, trans-caryophyllene, iso- caryophyllene and germacrene– D. Behavioural bioassays using electroantennogram (EAG) and wind tunnel proved that, among these identified compounds only α - pinene, trans-caryophyllene, β – phellandrene and germacrene-D evoked significant behavioral response and maximum response was obtained to a specific blend of these four compounds @ 10:1:0.1:3. Field trapping experiments of this blend conducted in the SHB infested field using multiple funnel traps further proved the efficiency of the blend with a mean trap catch of 176.7 ± 13.1 beetles. Mass trapping studies in the field helped to develop a kairomone trap for the management of SHB in the tea fields of southern India.

Keywords: electroantennogram, kairomone trap, Montanoa bipinnatifida, tea shot hole borer

Procedia PDF Downloads 203
1572 Precise Determination of the Residual Stress Gradient in Composite Laminates Using a Configurable Numerical-Experimental Coupling Based on the Incremental Hole Drilling Method

Authors: A. S. Ibrahim Mamane, S. Giljean, M.-J. Pac, G. L’Hostis

Abstract:

Fiber reinforced composite laminates are particularly subject to residual stresses due to their heterogeneity and the complex chemical, mechanical and thermal mechanisms that occur during their processing. Residual stresses are now well known to cause damage accumulation, shape instability, and behavior disturbance in composite parts. Many works exist in the literature on techniques for minimizing residual stresses in thermosetting and thermoplastic composites mainly. To study in-depth the influence of processing mechanisms on the formation of residual stresses and to minimize them by establishing a reliable correlation, it is essential to be able to measure very precisely the profile of residual stresses in the composite. Residual stresses are important data to consider when sizing composite parts and predicting their behavior. The incremental hole drilling is very effective in measuring the gradient of residual stresses in composite laminates. This method is semi-destructive and consists of drilling incrementally a hole through the thickness of the material and measuring relaxation strains around the hole for each increment using three strain gauges. These strains are then converted into residual stresses using a matrix of coefficients. These coefficients, called calibration coefficients, depending on the diameter of the hole and the dimensions of the gauges used. The reliability of the incremental hole drilling depends on the accuracy with which the calibration coefficients are determined. These coefficients are calculated using a finite element model. The samples’ features and the experimental conditions must be considered in the simulation. Any mismatch can lead to inadequate calibration coefficients, thus introducing errors on residual stresses. Several calibration coefficient correction methods exist for isotropic material, but there is a lack of information on this subject concerning composite laminates. In this work, a Python program was developed to automatically generate the adequate finite element model. This model allowed us to perform a parametric study to assess the influence of experimental errors on the calibration coefficients. The results highlighted the sensitivity of the calibration coefficients to the considered errors and gave an order of magnitude of the precisions required on the experimental device to have reliable measurements. On the basis of these results, improvements were proposed on the experimental device. Furthermore, a numerical method was proposed to correct the calibration coefficients for different types of materials, including thick composite parts for which the analytical approach is too complex. This method consists of taking into account the experimental errors in the simulation. Accurate measurement of the experimental errors (such as eccentricity of the hole, angular deviation of the gauges from their theoretical position, or errors on increment depth) is therefore necessary. The aim is to determine more precisely the residual stresses and to expand the validity domain of the incremental hole drilling technique.

Keywords: fiber reinforced composites, finite element simulation, incremental hole drilling method, numerical correction of the calibration coefficients, residual stresses

Procedia PDF Downloads 110
1571 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 121
1570 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 182
1569 Current Drainage Attack Correction via Adjusting the Attacking Saw-Function Asymmetry

Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap

Abstract:

Current drainage attack suggested previously is further studied in regular settings of closed-loop controlled Brushless DC (BLDC) motor with Kalman filter in the feedback loop. Modeling and simulation experiments are conducted in a Matlab environment, implementing the closed-loop control model of BLDC motor operation in position sensorless mode under Kalman filter drive. The current increase in the motor windings is caused by the controller (p-controller in our case) affected by false data injection of substitution of the angular velocity estimates with distorted values. Operation of multiplication to distortion coefficient, values of which are taken from the distortion function synchronized in its periodicity with the rotor’s position change. A saw function with a triangular tooth shape is studied herewith for the purpose of carrying out the bias injection with current drainage consequences. The specific focus here is on how the asymmetry of the tooth in the saw function affects the flow of current drainage. The purpose is two-fold: (i) to produce and collect the signature of an asymmetric saw in the attack for further pattern recognition process, and (ii) to determine conditions of improving stealthiness of such attack via regulating asymmetry in saw function used. It is found that modification of the symmetry in the saw tooth affects the periodicity of current drainage modulation. Specifically, the modulation frequency of the drained current for a fully asymmetric tooth shape coincides with the saw function modulation frequency itself. Increasing the symmetry parameter for the triangle tooth shape leads to an increase in the modulation frequency for the drained current. Moreover, such frequency reaches the switching frequency of the motor windings for fully symmetric triangular shapes, thus becoming undetectable and improving the stealthiness of the attack. Therefore, the collected signatures of the attack can serve for attack parameter identification via the pattern recognition route.

Keywords: bias injection attack, Kalman filter, BLDC motor, control system, closed loop, P-controller, PID-controller, current drainage, saw-function, asymmetry

Procedia PDF Downloads 54
1568 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 124
1567 Optimal Planning of Transmission Line Charging Mode During Black Start of a Hydroelectric Unit

Authors: Mohammad Reza Esmaili

Abstract:

After the occurrence of blackouts, the most important subject is how fast the electric service is restored. Power system restoration is an immensely complex issue and there should be a plan to be executed within the shortest time period. This plan has three main stages of black start, network reconfiguration and load restoration. In the black start stage, operators and experts may face several problems, for instance, the unsuccessful connection of the long high-voltage transmission line connected to the electrical source. In this situation, the generator may be tripped because of the unsuitable setting of its line charging mode or high absorbed reactive power. In order to solve this problem, the line charging process is defined as a nonlinear programming problem, and it is optimized by using GAMS software in this paper. The optimized process is performed on a grid that includes a 250 MW hydroelectric unit and a 400 KV transmission system. Simulations and field test results show the effectiveness of optimal planning.

Keywords: power system restoration, black start, line charging mode, nonlinear programming

Procedia PDF Downloads 50
1566 Monitoring the Phenomenon of Black Sand in Hurghada’s Artificial Lakes from Sources of Groundwater and Removal Techniques

Authors: Ahmed M. Noureldin, Khaled M. Naguib

Abstract:

This experimental investigation tries to identify the root cause of the black sand issue in one of the man-made lakes in a well-known Hurghada resort. The lake is nourished by the underground wells' source, which continuously empties into the Red Sea. Chemical testing was done by looking at spots of stinky black sand beneath the sandy lake surface. The findings on samples taken from several locations (wells, lake bottom sand samples, and clean sand with exact specifications as bottom sand) indicated the existence of organic sulfur bacteria that are responsible for the phenomena of black sand. Approximately 39.139 mg/kg of sulfide in the form of hydrogen sulfide was present in the lake bottom sand, while 1.145 mg/kg, before usage, was in the bare sand. The study also involved modeling with the GPS-X program for cleaning bottom sand that uses hydro cyclones as a physical-mechanical treatment method. The modeling findings indicated a Total Organic Carbon (TOC) removal effectiveness of 0.65%. The research recommended using hydro cyclones to routinely mechanically clear the sand from lake bottoms.

Keywords: man-made lakes, organic sulfur bacteria, total organic carbon, hydro cyclone

Procedia PDF Downloads 51
1565 Experimental Investigation of S822 and S823 Wind Turbine Airfoils Wake

Authors: Amir B. Khoshnevis, Morteza Mirhosseini

Abstract:

The paper deals with a sub-part of an extensive research program on the wake survey method in various Reynolds numbers and angles of attack. This research experimentally investigates the wake flow characteristics behind S823 and S822 airfoils in which designed for small wind turbines. Velocity measurements determined by using hot-wire anemometer. Data acquired in the wake of the airfoil at locations(c is the chord length): 0.01c - 3c. Reynolds number increased due to increase of free stream velocity. Results showed that mean velocity profiles depend on the angle of attack and location of data collections. Data acquired at the low Reynolds numbers (smaller than 10^5). Effects of Reynolds numbers on the mean velocity profiles are more significant in near locations the trailing edge and these effects decrease by taking distance from trailing edge toward downstream. Mean velocity profiles region increased by increasing the angle of attack, except for 7°, and also the maximum velocity deficit (velocity defect) increased. The difference of mean velocity in and out of the wake decreased by taking distance from trailing edge, and mean velocity profile become wider and more uniform.

Keywords: angle of attack, Reynolds number, velocity deficit, separation

Procedia PDF Downloads 355
1564 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 425
1563 A Facile Nanocomposite of Graphene Oxide Reinforced Chitosan/Poly-Nitroaniline Polymer as a Highly Efficient Adsorbent for Extracting Polycyclic Aromatic Hydrocarbons from Tea Samples

Authors: Adel M. Al-Shutairi, Ahmed H. Al-Zahrani

Abstract:

Tea is a popular beverage drunk by millions of people throughout the globe. Tea has considerable health advantages, in-cluding antioxidant, antibacterial, antiviral, chemopreventive, and anticarcinogenic properties. As a result of environmental pollution (atmospheric deposition) and the production process, tealeaves may also include a variety of dangerous substances, such as polycyclic aromatic hydrocarbons (PAHs). In this study, graphene oxide reinforced chitosan/poly-nitroaniline polymer was prepared to develop a sensitive and reliable solid phase extraction method (SPE) for extraction of PAH7 in tea samples, followed by high-performance liquid chromatography- fluorescence detection. The prepared adsorbent was validated in terms of linearity, the limit of detection, the limit of quantification, recovery (%), accuracy (%), and precision (%) for the determination of the PAH7 (benzo[a]pyrene, benzo[a]anthracene, benzo[b]fluoranthene, chrysene, benzo[b]fluoranthene, Dibenzo[a,h]anthracene and Benzo[g,h,i]perylene) in tea samples. The concentration was determined in two types of tea commercially available in Saudi Arabia, including black tea and green tea. The maximum mean of Σ7PAHs in black tea samples was 68.23 ± 0.02 ug kg-1 and 26.68 ± 0.01 ug kg-1 in green tea samples. The minimum mean of Σ7PAHs in black tea samples was 37.93 ± 0.01 ug kg-1 and 15.26 ± 0.01 ug kg-1 in green tea samples. The mean value of benzo[a]pyrene in black tea samples ranged from 6.85 to 12.17 ug kg-1, where two samples exceeded the standard level (10 ug kg-1) established by the European Union (UE), while in green tea ranged from 1.78 to 2.81 ug kg-1. Low levels of Σ7PAHs in green tea samples were detected in comparison with black tea samples.

Keywords: polycyclic aromatic hydrocarbons, CS, PNA and GO, black/green tea, solid phase extraction, Saudi Arabia

Procedia PDF Downloads 68
1562 Investigation of Flow Structure over X-45 Type Non-Slender Delta Wing Planform

Authors: B. Yanıktepe, C. Özalp, B. Şahin

Abstract:

Delta wing planform is an essential aerodynamic configuration, which could be effectively used at relatively high angles of attack than conventional wings in subsonic flow conditions. The flow over delta wings can be characterized by a pair of leading edge vortices emanating from wing apex. Boundary layer separation causes these vortical structures formed by rolling up of viscous flow sheet. This flow separation mechanism is occurred due to angle of attack and sharp leading edges of the delta wing. Therefore, complexity and variety in planform designs rise to catch the best under abnormal flow conditions. The present experimental study investigates the near surface flow structure and aerodynamic flow characteristics of X-45 type non-slender delta wing planform using dye visualization, Stereoscopic Particle Image Velocimetry (stereo-PIV). The instantaneous images are acquired on the plan-view plane within 5o≤α≤20o to calculate the time-averaged flow data. It can be concluded that vortical flow with a pair of well-defined LEVs over X-45 develop at very low angles of attack, secondary vortex are also evident and form close to the wing surface similar to delta and lambda planforms. The stall occurs at an angle of attack α=32o.

Keywords: aerodynamic, delta wing, PIV, vortex breakdown

Procedia PDF Downloads 390
1561 Interspecific Hybridization in Natural Sturgeon Populations of the Eastern Black Sea: The Consequence of Drastic Population Decline

Authors: Tamar Beridze, Elisa Boscari, Fleur Scheele, Tamari Edisherashvili, Cort Anderson, Leonardo Congiu

Abstract:

The eastern part of the Black Sea and its tributaries are suitable habitats for several sturgeon species, among which Acipenser gueldenstaedtii, A. stellatus, A. nudiventris, A. persicus, A. sturio, and H. huso are well documented. However, different threats have led these species to a dramatic decline; all of them are currently listed as Critically Endangered and some Locally Extinct in that area. We tested 94 wild sturgeon samples from the Black Sea and Rioni River by analyzing the mitochondrial Control Region and nuclear markers for hybrid identification. The data analyses (1) assessed mitochondrial diversity among samples, (2) identified their species, as well as (3) indicated instances of hybridization. The data collected, besides confirming a sharp decrease of catches of Beluga and Stellate sturgeon in recent years, also revealed four juvenile hybrids between Russian and Stellate sturgeon, providing the first evidence of natural interspecific hybridization in the Rioni. The present communication raises concerns about the status of sturgeon species in this area and underlines the urgent need for conservation programs to restore self-sustaining populations.

Keywords: black sea, sturgeon, Rioni river, interspecific hybridization

Procedia PDF Downloads 103
1560 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution

Authors: V. S. S. Kumar, V. Ramya

Abstract:

In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.

Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept

Procedia PDF Downloads 424
1559 Stress Analysis of the Ceramics Heads with Different Sizes under the Destruction Tests

Authors: V. Fuis, P. Janicek, T. Navrat

Abstract:

The global solved problem is the calculation of the parameters of ceramic material from a set of destruction tests of ceramic heads of total hip joint endoprosthesis. The standard way of calculation of the material parameters consists in carrying out a set of 3 or 4 point bending tests of specimens cut out from parts of the ceramic material to be analysed. In case of ceramic heads, it is not possible to cut out specimens of required dimensions because the heads are too small (if the cut out specimens were smaller than the normalized ones, the material parameters derived from them would exhibit higher strength values than those which the given ceramic material really has). A special destruction device for heads destruction was designed and the solved local problem is the modification of this destructive device based on the analysis of tensile stress in the head for two different values of the depth of the conical hole in the head. The goal of device modification is a shift of the location with extreme value of 1 max from the region of head’s hole bottom to its opening. This modification will increase the credibility of the obtained material properties of bio ceramics, which will be determined from a set of head destructions using the Weibull weakest link theory.

Keywords: ceramic heads, depth of the conical hole, destruction test, material parameters, principal stress, total hip joint endoprosthesis

Procedia PDF Downloads 392
1558 Determination of the Risks of Heart Attack at the First Stage as Well as Their Control and Resource Planning with the Method of Data Mining

Authors: İbrahi̇m Kara, Seher Arslankaya

Abstract:

Frequently preferred in the field of engineering in particular, data mining has now begun to be used in the field of health as well since the data in the health sector have reached great dimensions. With data mining, it is aimed to reveal models from the great amounts of raw data in agreement with the purpose and to search for the rules and relationships which will enable one to make predictions about the future from the large amount of data set. It helps the decision-maker to find the relationships among the data which form at the stage of decision-making. In this study, it is aimed to determine the risk of heart attack at the first stage, to control it, and to make its resource planning with the method of data mining. Through the early and correct diagnosis of heart attacks, it is aimed to reveal the factors which affect the diseases, to protect health and choose the right treatment methods, to reduce the costs in health expenditures, and to shorten the durations of patients’ stay at hospitals. In this way, the diagnosis and treatment costs of a heart attack will be scrutinized, which will be useful to determine the risk of the disease at the first stage, to control it, and to make its resource planning.

Keywords: data mining, decision support systems, heart attack, health sector

Procedia PDF Downloads 332
1557 Aerodynamic Coefficients Prediction from Minimum Computation Combinations Using OpenVSP Software

Authors: Marine Segui, Ruxandra Mihaela Botez

Abstract:

OpenVSP is an aerodynamic solver developed by National Aeronautics and Space Administration (NASA) that allows building a reliable model of an aircraft. This software performs an aerodynamic simulation according to the angle of attack of the aircraft makes between the incoming airstream, and its speed. A reliable aerodynamic model of the Cessna Citation X was designed but it required a lot of computation time. As a consequence, a prediction method was established that allowed predicting lift and drag coefficients for all Mach numbers and for all angles of attack, exclusively for stall conditions, from a computation of three angles of attack and only one Mach number. Aerodynamic coefficients given by the prediction method for a Cessna Citation X model were finally compared with aerodynamics coefficients obtained using a complete OpenVSP study.

Keywords: aerodynamic, coefficient, cruise, improving, longitudinal, openVSP, solver, time

Procedia PDF Downloads 205
1556 Non-Singular Gravitational Collapse of a Dust Cloud in Einstein-Cartan Theory

Authors: Amir Hadi Ziaie, Mostafa Hashemi, Shahram Jalalzadeh

Abstract:

It is now known that the end state of the collapse process of a dense star under its own gravity is the formation of a spacetime singularity. This is the spacetime event where the energy density and spacetime curvature diverge, and the classical general relativity breaks down. As we know, a realistic star is composed of fermions so that their spin effects could alter the final fate of the collapse scenario. The underlying theory within which the inclusion of spin effects can be worked out is the Einstein-Cartan theory. In this theory, the spacetime torsion which is defined as a geometrical quantity, is related to an intrinsic angular momentum of fermions (spin). In this work, we study the collapse process of a homogeneous spin fluid in such a framework and show that taking into account the spin effects of the collapsing cloud could prevent the formation of spacetime singularity.

Keywords: gravitational collapse, einstein-cartan theory, spacetime singularity, black hole physics

Procedia PDF Downloads 374
1555 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 337
1554 Racial Distress in the Digital Age: A Mixed-Methods Exploration of the Effects of Social Media Exposure to Police Brutality on Black Students

Authors: Amanda M. McLeroy, Tiera Tanksley

Abstract:

The 2020 movement for Black Lives, ignited by anti-Black police brutality and exemplified by the public execution of George Floyd, underscored the dual potential of social media for political activism and perilous exposure to traumatic content for Black students. This study employs Critical Race Technology Theory (CRTT) to scrutinize algorithmic anti-blackness and its impact on Black youth's lives and educational experiences. The research investigates the consequences of vicarious exposure to police brutality on social media among Black adolescents through qualitative interviews and quantitative scale data. The findings reveal an unprecedented surge in exposure to viral police killings since 2020, resulting in profound physical, socioemotional, and educational effects on Black youth. CRTT forms the theoretical basis, challenging the notion of digital technologies as post-racial and neutral, aiming to dismantle systemic biases within digital systems. Black youth, averaging over 13 hours of daily social media use, face constant exposure to graphic images of Black individuals dying. The study connects this exposure to a range of physical, socioemotional, and mental health consequences, emphasizing the urgent need for understanding and support. The research proposes questions to explore the extent of police brutality exposure and its effects on Black youth. Qualitative interviews with high school and college students and quantitative scale data from undergraduates contribute to a nuanced understanding of the impact of police brutality exposure on Black youth. Themes of unprecedented exposure to viral police killings, physical and socioemotional effects, and educational consequences emerge from the analysis. The study uncovers how vicarious experiences of negative police encounters via social media lead to mistrust, fear, and psychosomatic symptoms among Black adolescents. Implications for educators and counselors are profound, emphasizing the cultivation of empathy, provision of mental health support, integration of media literacy education, and encouragement of activism. Recognizing family and community influences is crucial for comprehensive support. Professional development opportunities in culturally responsive teaching and trauma-informed approaches are recommended for educators. In conclusion, creating a supportive educational environment that addresses the emotional impact of social media exposure to police brutality is crucial for the well-being and development of Black adolescents. Counselors, through safe spaces and collaboration, play a vital role in supporting Black youth facing the distressing effects of social media exposure to police brutality.

Keywords: black youth, mental health, police brutality, social media

Procedia PDF Downloads 28
1553 The Synthesis of AgInS₂/SnS₂ Nanocomposites with Enhanced Photocatalytic Degradation of Norfloxacin

Authors: Mingmei Zhang, Xinyong Li

Abstract:

AgInS₂/SnS₂ (AIS) nanocomposites were synthesized by a simple hydrothermal method. The morphology and composition of the fabricated AIS nanocomposites were investigated by field-emission scanning electron microscopy (SEM), X-ray diffraction (XRD), high resolution transmission electron microscopy (HRTEM) and X-ray photoelectron spectroscopy (XPS). Moreover, the as-prepared AIS photocatalysts exhibited excellent photocatalytic activities for the degradation of Norfloxacin (NOR), mainly due to its high optical absorption and separation efficiency of photogenerated electron-hole pairs, as evidenced by UV–vis diffusion reflection spectra (DRS) and Surface photovoltage (SPV) spectra. Furthermore, the interfacial charges transfer mechanism was also discussed by DFT calculations.

Keywords: AIS nanocomposites, electron-hole pairs, charges transfer, DFTcaculations

Procedia PDF Downloads 162
1552 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 231
1551 Geographies of Blackness: An Exploration of the Subaltern Public Spheres of the African Diaspora in European Cities

Authors: Teju N. Adisa-Farrar

Abstract:

In European cities, social, political and cultural geographies of blackness exist. Organizations create spaces to discuss, express, and expose the realities of young people of African descent creating an Afropean lifestyle with transnational affiliations. Focusing on black and brown spaces produced by and for the young people of African descent in Vienna and Brussels, it became clear a multidisciplinary approach would be necessary. Using Cultural Studies frameworks along with Communications Theories on Black Public Spheres and Social-Geography, a basis was created for exploring the creative, political, and economic responses of young people who are apart of the historically (and contemporary) oppressed and excluded groups of the African Diaspora. Through this intrinsic study, it became apparent that spaces created and reclaimed by young people of the African Diaspora were more inclusive and democratic than other spaces. The organizations studied have used city life as the platform to express their struggles and celebrations of their multicultural identity; clearly using historical, global black and Pan-African movements as the basis for local adaptation of an African Diaspora identity.

Keywords: African diaspora, black public sphere, identity, spaces, geographies

Procedia PDF Downloads 263
1550 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN

Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu

Abstract:

Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.

Keywords: DDoS detection, EMD, relative entropy, SDN

Procedia PDF Downloads 306
1549 Influence of Compactive Efforts on the Hydraulic Conductivity of Bagasse Ash Treated Black Cotton Soil

Authors: T. S. Ijimdiya, K. J. Osinubi

Abstract:

This study examines the influence of compactive efforts on hydraulic conductivity behaviour of compacted black cotton soil treated with bagasse ash which is necessary in assessing the performance of the soil - bagasse ash mixture for use as a suitable barrier material in waste containment application. Black cotton soil treated with up to 12% bagasse ash (obtained from burning the fibrous residue from the extraction of sugar juice from sugarcane) by dry weight of soil for use in waste containment application. The natural soil classifies as A-7-6 or CH in accordance with the AASHTO and the Unified Soil Classification System, respectively. The treated soil samples were prepared at molding water contents of -2, 0, +2, and +4 % of optimum moisture contents and compacted using four compactive efforts of Reduced British Standard Light (RBSL), British Standard light (BSL), West African Standard (WAS) and British Standard Heavy (BSH). The results obtained show that hydraulic conductivity decreased with increase in bagasse ash content, moulding water content and compaction energy.

Keywords: bagasse ash treatment, black cotton soil, hydraulic conductivity, moulding water contents, compactive efforts

Procedia PDF Downloads 403
1548 Pyrolysis of the Reed (Phragmites australis) and Evaluation of Pyrolysis Products

Authors: Ahmet Helvaci, Selcuk Dogan

Abstract:

Reed in especially almost all the lakes in Western Anatolia grows naturally. Due to the abundance of reed, pyrolysis of reed is very economical and practical application. In this study, it is aimed to determine the optimum conditions for the pyrolysis of the reed which is a cheap and abundant raw material and to evaluate pyrolysis products. For this purpose, reed was used obtained from Eber Lake located in the borders of Bolvadin county of Afyonkarahisar. Optimum pyrolysis conditions have been determined by examining the effects of changes in pyrolysis temperature and pyrolysis time. The evaluation of the obtained liquid and solid pyrolysis products has been investigated. Especially evaluability of solid carbon black production of tires has been investigated. Tire samples were prepared with carbon black samples obtained as a result of the pyrolysis process at different temperatures. Then, performance tests were made and compared with reference carbon blacks, used in the market and standards. At the same time, surface area measurement analysis of carbon black samples was made and compared again with reference carbon blacks. In addition, the fuel values of liquid products were also determined by calorimeter. It has been determined that the best surface area (about 370 m²/g) for carbon black samples, for tire production is 40 minutes at 500ᵒC. It was also found that the best result for evaluation studies in tire production was carbon black samples obtained at 450ᵒC pyrolysis temperature. In addition, it was seen that the calorimetry results of the liquid product obtained during 60 minutes of pyrolysis were quite good (around 5500 kcal/kg).

Keywords: evaluation of products, optimization, pyrolysis, reed

Procedia PDF Downloads 169
1547 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 136
1546 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 181
1545 Health Impacts of Size Segregated Particulate Matter and Black Carbon in Industrial Area of Firozabad

Authors: Kalpana Rajouriya, Ajay Taneja

Abstract:

Particulates are ubiquitous in the air environment and cause serious threats to human beings, such as lung cancer, Chronic obstructive pulmonary disease (COPD), and Asthma. Particulates mainly arise from industrial effluent, vehicular emission, and other anthropogenic activities. In the glass industrial city Firozabad, real-time monitoring (mass as well as a number) of size segregated Particulate Matter (PM) and black carbon was done by Aerosol Black Carbon Detector (ABCD) and GRIMM portable aerosol Spectrometer at two different sites in which one site is urban, and another is rural. The average mass concentration of size segregated PM during the study period (March & April 2022) was recorded as PM₁₀ (223.73 g/m-³), PM₅.₀ (44.955 g/m-³), PM₂.₅ (59.275 g/m-³), PM₁.₀ (33.02 g/m-³), PM₀.₅ (2.05 g/m-³), and PM₀.₂₅ (2.99 g/m- ³). In number mode, PM concentration was found as PM₁₀ (27.46g/m-³), PM₅.₀ (233.48g/m-³), PM₂.₅ (646.61g/m-³), PM₁.₀ (1134.94 g/m-³), PM₀.₅ (14056.04g/m-³), and PM₀.₂₅ (182906.4 g/m-³). The highest concentration of BC was found in Urban due to the emissions from diesel engines and wood burning while NO2 was highest at the rural sites. The concentrations of PM₁₀ and PM₂.₅ exceeded the NAAQS and WHO guidelines. The sensitive, exposed population may be at risk of developing health-related problems from exposure to size-segregated PM and BC.

Keywords: particulate matter, black carbon, NO2, health risk

Procedia PDF Downloads 19
1544 Barriers to Yoga and Yoga-Based Therapy for Black and Brown Individuals in the United States: Implications for Social Work Practice

Authors: Jessica Gladden

Abstract:

Yoga has been accepted in the majority of communities in the United States as a method of assisting individuals with improving their physical health. Both community yoga classes and yoga-based therapy have been shown to be highly useful for individual’s mental health. Yoga-based therapy has been supported by research to be an evidence-based practice for individuals experiencing anxiety, depression, and disordered eating and for those experiencing post traumatic stress disorder in the wake of trauma. Many individuals who have experienced trauma, as well as other mental health diagnoses, are either very disconnected from their physical bodies or feel unsafe in their bodies. Yoga can be a method of creating safety and control in the body. This is recommended by some of the leading researchers in trauma therapy as a beginning step towards finding safety in the body in order to begin to work on the additional mental health challenges before addressing other long-term challenges. Unfortunately, yoga for physical and mental health is underutilized in black and brown communities despite the research regarding the benefits. Very few studies have examined the barriers to access to yoga for black, brown, and indigenous individuals. This study interviewed 15 yoga practitioners who identified as black or brown and explored the barriers they see in their communities related to accessing yoga and yoga-based services. Several of the themes reported include not feeling welcome, cost of services, time, and cultural/ religious components. Methods for reducing barriers will also be discussed.

Keywords: yoga, sport, barrier, black

Procedia PDF Downloads 57