Science.gov

Sample records for detect relay attacks

  1. Detecting relay attacks on RFID communication systems using quantum bits

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  4. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    JOHNS, B.R.; KOCH, M.R.

    2000-01-28

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping Instrumentation and Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  5. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.

    1999-10-26

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  6. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.; JOHNS, B.R.

    1999-12-21

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  7. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    JOHNS, B.R.

    1999-05-05

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  8. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.

    2000-02-28

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping Instrumentation and Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  9. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  10. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  12. Method for detecting sophisticated cyber attacks

    SciTech Connect

    Potok, Thomas E.

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  13. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  14. Detection of hydrogen attack in base metal and weld HAZ

    SciTech Connect

    Birring, A.S.; Elliot, J.; Hsiao, C.P.

    1995-12-01

    Hydrogen attack is known to occur in C-1/2Mo steels operating at high temperature and pressure in the hydrogen environment. The attack occurs in the base metal as well as in the weld heat affected zone (HAZ) of vessels and pipes. Hydrogen attack reduces the strength and toughness of steel and, if left undetected, can lead to component failure. Failures can be avoided by timely application of reliable and sensitive nondestructive techniques. Ultrasonic techniques were developed and applied to detect hydrogen attack in both the base metal and weld HAZ attack. Ultrasonic backscatter and velocity ratio techniques were applied for detection of base metal attack. These techniques are, however, not suitable for detection of HAZ attack. Conventional shear wave examination is currently used for HAZ inspection. This method can detect large cracks but is not sensitive to detect microcracks produced by hydrogen attack. A combination of two techniques was developed for detection of HAZ attack. These techniques are: contact focused angle beam S-wave and pitch-catch L-wave. The first technique focuses the beam using an acoustic lens while the second technique uses the intersection point of the two pitch-catch beam axes to illuminate the HAZ zone. Both the focused and pitch-catch techniques were applied on samples with simulated HAZ attack. The techniques were successful in detecting simulated attack.

  15. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  16. Real time testing of intelligent relays for synchronous distributed generation islanding detection

    NASA Astrophysics Data System (ADS)

    Zhuang, Davy

    As electric power systems continue to grow to meet ever-increasing energy demand, their security, reliability, and sustainability requirements also become more stringent. The deployment of distributed energy resources (DER), including generation and storage, in conventional passive distribution feeders, gives rise to integration problems involving protection and unintentional islanding. Distributed generators need to be islanded for safety reasons when disconnected or isolated from the main feeder as distributed generator islanding may create hazards to utility and third-party personnel, and possibly damage the distribution system infrastructure, including the distributed generators. This thesis compares several key performance indicators of a newly developed intelligent islanding detection relay, against islanding detection devices currently used by the industry. The intelligent relay employs multivariable analysis and data mining methods to arrive at decision trees that contain both the protection handles and the settings. A test methodology is developed to assess the performance of these intelligent relays on a real time simulation environment using a generic model based on a real-life distribution feeder. The methodology demonstrates the applicability and potential advantages of the intelligent relay, by running a large number of tests, reflecting a multitude of system operating conditions. The testing indicates that the intelligent relay often outperforms frequency, voltage and rate of change of frequency relays currently used for islanding detection, while respecting the islanding detection time constraints imposed by standing distributed generator interconnection guidelines.

  17. DDoS Attack Detection Algorithms Based on Entropy Computing

    NASA Astrophysics Data System (ADS)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  18. Transmission line relay mis-operation detection based on time-synchronized field data

    SciTech Connect

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such, it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.

  19. Transmission line relay mis-operation detection based on time-synchronized field data

    DOE PAGESBeta

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such,more » it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.« less

  20. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  1. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  2. Patrol detection for replica attacks on wireless sensor networks.

    PubMed

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods. PMID:22163752

  3. Presentation attack detection for face recognition using light field camera.

    PubMed

    Raghavendra, R; Raja, Kiran B; Busch, Christoph

    2015-03-01

    The vulnerability of face recognition systems isa growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detection (PAD)(or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution of sophisticated presentation attacks (or spoof attacks). In this paper, we present a new perspective for face presentation attack detection by introducing light field camera (LFC). Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it exhibits an unique characteristic of rendering multiple depth(or focus) images in a single capture. Thus, we present a novel approach that involves exploring the variation of the focus between multiple depth (or focus) images rendered by the LFC that in turn can be used to reveal the presentation attacks. To this extent, we first collect a new face artefact database using LFC that comprises of 80 subjects. Face artefacts are generated by simulating two widely used attacks, such as photo print and electronic screen attack. Extensive experiments carried out on the light field face artefact database have revealed the outstanding performance of the proposed PAD scheme when benchmarked with various well established state-of-the-art schemes. PMID:25622320

  4. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  5. Improved signal detection for two-way wireless relaying networks under imperfect time synchronisation

    NASA Astrophysics Data System (ADS)

    O El Astal, Mohammed Taha; Olivier, Jan Corné

    2014-12-01

    Most research on two-way wireless relaying networks (TWRNs) assumes perfect time synchronisation between the terminals and among the relays. This is, however, difficult to accomplish as the terminals and relays are randomly located. The lack of synchronisation causes inter-symbol interference which introduces a serious impairment and negatively impacts the network's performance. In this article, an enhanced interference cancellation (EIC)-based detector is proposed to mitigate the experienced performance degradation while maintaining low complexity. It uses an innovative iterative approach and also benefits of interference components of currently detected symbols using a modified maximum likelihood (ML) scheme. As a result, it shows significant performance improvement compared to the conventional detector under different conditions of imperfect synchronisation. In addition, two existing interference cancellation detectors that are originally proposed for one-way WRNs are extended to TWRNs, even though the timing error among the terminals is a unique issue for TWRNs and never occurs in one-way networks. Unlike the existing literature, the proposed detectors apply to networks with an arbitrary number of multiple-antenna relays. Numerical simulation is provided in terms of bit error rate, to show the improvement in performance when compared to the conventional detector. Moreover, it is shown that the EIC detector outperforms the extended detectors and provides 3 to 4 dB gain under moderate condition of imperfect synchronisation.

  6. Intelligent Power Swing Detection Scheme to Prevent False Relay Tripping Using S-Transform

    NASA Astrophysics Data System (ADS)

    Mohamad, Nor Z.; Abidin, Ahmad F.; Musirin, Ismail

    2014-06-01

    Distance relay design is equipped with out-of-step tripping scheme to ensure correct distance relay operation during power swing. The out-of-step condition is a consequence result from unstable power swing. It requires proper detection of power swing to initiate a tripping signal followed by separation of unstable part from the entire power system. The distinguishing process of unstable swing from stable swing poses a challenging task. This paper presents an intelligent approach to detect power swing based on S-Transform signal processing tool. The proposed scheme is based on the use of S-Transform feature of active power at the distance relay measurement point. It is demonstrated that the proposed scheme is able to detect and discriminate the unstable swing from stable swing occurring in the system. To ascertain validity of the proposed scheme, simulations were carried out with the IEEE 39 bus system and its performance has been compared with the wavelet transform-based power swing detection scheme.

  7. Relayed 13C magnetization transfer: Detection of malate dehydrogenase reaction in vivo

    NASA Astrophysics Data System (ADS)

    Yang, Jehoon; Shen, Jun

    2007-02-01

    Malate dehydrogenase catalyzes rapid interconversion between dilute metabolites oxaloacetate and malate. Both oxaloacetate and malate are below the detection threshold of in vivo MRS. Oxaloacetate is also in rapid exchange with aspartate catalyzed by aspartate aminotransferase, the latter metabolite is observable in vivo using 13C MRS. We hypothesized that the rapid turnover of oxaloacetate can effectively relay perturbation of magnetization between malate and aspartate. Here, we report indirect observation of the malate dehydrogenase reaction by saturating malate C2 resonance at 71.2 ppm and detecting a reduced aspartate C2 signal at 53.2 ppm due to relayed magnetization transfer via oxaloacetate C2 at 201.3 ppm. Using this strategy the rate of the cerebral malate dehydrogenase reaction was determined to be 9 ± 2 μmol/g wet weight/min (means ± SD, n = 5) at 11.7 Tesla in anesthetized adult rats infused with [1,6- 13C 2]glucose.

  8. Reliability-aware iterative detection scheme (RAID) for distributed IDM space-time codes in relay systems

    NASA Astrophysics Data System (ADS)

    Lenkeit, Florian; Wübben, Dirk; Dekorsy, Armin

    2013-12-01

    In this article, distributed interleave-division multiplexing space-time codes (dIDM-STCs) are applied for multi-user two-hop decode-and-forward (DF) relay networks. In case of decoding errors at the relays which propagate to the destination, severe performance degradations can occur as the original detection scheme for common IDM-STCs does not take any reliability information about the first hop into account. Here, a novel reliability-aware iterative detection scheme (RAID) for dIDM-STCs is proposed. This new detection scheme takes the decoding reliability of the relays for each user into account for the detection at the destination. Performance evaluations show that the proposed RAID scheme clearly outperforms the original detection scheme and that in certain scenarios even a better performance than for adaptive relaying schemes can be achieved.

  9. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    de Graaf, Rennie; Hegazy, Islam; Horton, Jeffrey; Safavi-Naini, Reihaneh

    Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.

  10. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  11. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    NASA Astrophysics Data System (ADS)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  12. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  13. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    PubMed

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  14. Steganography forensics method for detecting least significant bit replacement attack

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  15. An effective Denial of Service Attack Detection Method in Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Luan, Liangyu; Fu, Yingfang; Xiao, Peng

    In order to detect the DoS attack (Denial-of-Service attack) when wireless mesh networks adopt AODV routing protocol of Ad Hoc networks. Such technologies as an end-to-end authentication, utilization rate of cache memory, two pre-assumed threshold value and distributed voting are used in this paper to detect DoS attacker, which is on the basic of hierarchical topology structure in wireless mesh networks. Through performance analysis in theory and simulations experiment, the scheme would improve the flexibility and accuracy of DoS attack detection, and would obviously improve its security in wireless mesh networks.

  16. Detection of chemical or biological artillery attacks using a seismic/acoustic sensor: preliminary results

    NASA Astrophysics Data System (ADS)

    Baker, Vincent J.; Walter, Paul A.

    2004-04-01

    Chemical and biological weapons pose a serious threat to the United States armed forces. Early detection of a chemical or biological attack is critical to the safety of soldiers in the field. The Edgewood Chemical and Biological Center (ECBC) is conducting a study using currently fielded seismic and acoustic sensors to detect chemical and biological attacks. This paper presents some preliminary results.

  17. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  18. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  19. Distance Relaying with Power Swing Detection based on Voltage and Reactive Power Sensitivity

    NASA Astrophysics Data System (ADS)

    Patel, Ujjaval J.; Chothani, Nilesh G.; Bhatt, Praghnesh J.

    2016-02-01

    Sudden changes in loading or configuration of an electrical network causes power swing which may result in an unwanted tripping of the distance relay. Hence, it becomes utmost necessary to rapidly and reliably discriminate between actual fault and power swing conditions in order to prevent instability in power network due to mal operation of distance relay. This paper proposes a novel method for the discrimination between fault and power swing based on rate of change of voltage and reactive power measured at relay location. The effectiveness of the proposed algorithm is evaluated by simulating series of power swing conditions in PSCAD/EMTDC® software for different disturbances such as change in mechanical power input to synchronous generator, tripping of parallel line due to fault and sudden application of heavy load. It is revealed that the distance relay gives successful tripping in case of different fault conditions and remains inoperative for power swing with the implementation of the proposed algorithm. Moreover, the proposed scheme has ability to distinguish the symmetrical and asymmetrical fault occurrence during power swing condition.

  20. IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Du, Ping; Abe, Shunji

    Denial of service (DoS) attacks have become one of the most serious threats to the Internet. Enabling detection of attacks in network traffic is an important and challenging task. However, most existing volume-based schemes can not detect short-term attacks that have a minor effect on traffic volume. On the other hand, feature-based schemes are not suitable for real-time detection because of their complicated calculations. In this paper, we develop an IP packet size entropy (IPSE)-based DoS/DDoS detection scheme in which the entropy is markedly changed when traffic is affected by an attack. Through our analysis, we find that the IPSE-based scheme is capable of detecting not only long-term attacks but also short-term attacks that are beyond the volume-based schemes' ability to detect. Moreover, we test our proposal using two typical Internet traffic data sets from DARPA and SINET, and the test results show that the IPSE-based detection scheme can provide detection of DoS/DDoS attacks not only in a local area network (DARPA) and but also in academic backbone network (SINET).

  1. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  2. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  3. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems

    NASA Astrophysics Data System (ADS)

    Chan-Tin, Eric; Feldman, Daniel; Hopper, Nicholas; Kim, Yongdae

    A network coordinate system assigns Euclidean “virtual” coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Azureus/Vuze BitTorrent client. Zage and Nita-Rotaru (CCS 2007) and independently, Kaafar et al. (SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. We propose a new attack, Frog-Boiling, that defeats anomaly-detection based defenses in the context of network coordinate systems, and demonstrate empirically that Frog-Boiling is more disruptive than the previously known attacks. Our results suggest that a new approach is needed to solve this problem: outlier detection alone cannot be used to secure network coordinate systems.

  4. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. PMID:26073643

  5. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  6. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  7. Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

    PubMed Central

    Banković, Zorana; Fraga, David; Moya, José M.; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  8. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  9. Multi stage attack Detection system for Network Administrators using Data Mining

    SciTech Connect

    Rajeshwar, Katipally; Gasior, Wade C; Yang, Dr. Li

    2010-04-01

    In this paper, we present a method to discover, visualize, and predict behavior pattern of attackers in a network based system. We proposed a system that is able to discover temporal pattern of intrusion which reveal behaviors of attackers using alerts generated by Intrusion Detection System (IDS). We use data mining techniques to find the patterns of generated alerts by generating Association rules. Our system is able to stream real-time Snort alerts and predict intrusions based on our learned rules. Therefore, we are able to automatically discover patterns in multistage attack, visualize patterns, and predict intrusions.

  10. Magnetoresistor monitors relay performance

    NASA Technical Reports Server (NTRS)

    Krebs, D. Q.

    1966-01-01

    Magnetoresistor monitors the action of relays without disturbing circuit parameters or degrading relay performance. The magnetoresistor measures the relay magnetic flux produced under transient conditions to establish the characteristic signature of the relay.

  11. Autonomous mobile communication relays

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Everett, Hobart R.; Manouk, Narek; Verma, Ambrish

    2002-07-01

    Maintaining a solid radio communication link between a mobile robot entering a building and an external base station is a well-recognized problem. Modern digital radios, while affording high bandwidth and Internet-protocol-based automatic routing capabilities, tend to operate on line-of-sight links. The communication link degrades quickly as a robot penetrates deeper into the interior of a building. This project investigates the use of mobile autonomous communication relay nodes to extend the effective range of a mobile robot exploring a complex interior environment. Each relay node is a small mobile slave robot equipped with sonar, ladar, and 802.11b radio repeater. For demonstration purposes, four Pioneer 2-DX robots are used as autonomous mobile relays, with SSC-San Diego's ROBART III acting as the lead robot. The relay robots follow the lead robot into a building and are automatically deployed at various locations to maintain a networked communication link back to the remote operator. With their on-board external sensors, they also act as rearguards to secure areas already explored by the lead robot. As the lead robot advances and RF shortcuts are detected, relay nodes that become unnecessary will be reclaimed and reused, all transparent to the operator. This project takes advantage of recent research results from several DARPA-funded tasks at various institutions in the areas of robotic simulation, ad hoc wireless networking, route planning, and navigation. This paper describes the progress of the first six months of the project.

  12. Entropy Based Detection of DDoS Attacks in Packet Switching Network Models

    NASA Astrophysics Data System (ADS)

    Lawniczak, Anna T.; Wu, Hao; di Stefano, Bruno

    Distributed denial-of-service (DDoS) attacks are network-wide attacks that cannot be detected or stopped easily. They affect “natural” spatio-temporal packet traffic patterns, i.e. “natural distributions” of packets passing through the routers. Thus, they affect “natural” information entropy profiles, a sort of “fingerprints”, of normal packet traffic. We study if by monitoring information entropy of packet traffic through selected routers one may detect DDoS attacks or anomalous packet traffic in packet switching network (PSN) models. Our simulations show that the considered DDoS attacks of “ping” type cause shifts in information entropy profiles of packet traffic monitored even at small sets of routers and that it is easier to detect these shifts if static routing is used instead of dynamic routing. Thus, network-wide monitoring of information entropy of packet traffic at properly selected routers may provide means for detecting DDoS attacks and other anomalous packet traffics.

  13. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  14. Node ID based detection of Sybil attack in mobile wireless sensor network

    NASA Astrophysics Data System (ADS)

    Sharmila, S.; Umamaheswari, G.

    2013-10-01

    Security is the major issue in wireless sensor networks and many defence mechanisms have been developed to secure the network from these alarming attacks by detecting the malicious nodes which hinder the performance of the network. Sybil attack can make the network vulnerable. Sybil attack means a node which illegitimately claims multiple identities. This attack threatens wireless sensor network in routing, voting system, fair resource allocation, data aggregation and misbehaviour detection. Hence, the research is carried out to prevent the Sybil attack and improve the network performance. The node ID-based scheme is proposed, where the detection is based on node registration, consisting of two phases and the assignment of ID to the node is done dynamically. The ID's corresponding to the nodes registered is at the base station and the node active time is monitored, any abnormalities in the above phases confirm the presence of Sybil nodes in the network. The scheme is simulated using NS2. The energy consumed for this algorithm is 2.3 J. The proposed detection scheme is analysed based on the network's PDR and found that the throughput has improved, which prove that this scheme may be used in the environment where security is needed.

  15. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    PubMed

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  16. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  17. Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Kim, Jong Hyun; Seo, Dongil; Soh, Wooyoung; Kim, Seoksoo

    Botnet-based cyber attacks cause large-scale damage with increasingly intelligent tools, which has called for varied research on bot detection. In this study, we developed a method of monitoring behaviors of host-based processes from the point that a bot header attempts to make zombie PCs, detecting cyber attack precursor symptoms. We designed an algorithm that figures out characteristics of botnet which attempts to launch malicious behaviors by means of signature registration, which is for process/reputation/network traffic/packet/source analysis and a white list, as a measure to respond to bots from the end point.

  18. Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hussain, Sajid; Rahman, Md Shafayat

    2009-04-01

    With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-middle attacks. We analyze the feasibility of using received signal strength indicator (RSSI) values measured at the receiver node to detect these kinds of attacks. As RSSI value is readily available for every message received by a node, a successful utilization of this information in security breach detection can be a very important contribution.

  19. DETECTION OF TOXICANT(S) ON BUILDING SURFACES FOLLOWING CHEMICAL ATTACK

    EPA Science Inventory

    A critical step prior to reoccupation of any facility following a chemical attack is monitoring for toxic compounds on surfaces within that facility. Low level detection of toxicant(s) is necessary to ensure that these compounds have been eliminated after building decontaminatio...

  20. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank

  1. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    PubMed Central

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-01-01

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178

  2. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    NASA Astrophysics Data System (ADS)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  3. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    SciTech Connect

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O'Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  4. Group Testing Based Detection of Web Service DDoS Attackers

    NASA Astrophysics Data System (ADS)

    Nashat, Dalia; Jiang, Xiaohong; Kameyama, Michitaka

    The Distributed Denial of Service attack (DDoS) is one of the major threats to network security that exhausts network bandwidth and resources. Recently, an efficient approach Live Baiting was proposed for detecting the identities of DDoS attackers in web service using low state overhead without requiring either the models of legitimate requests nor anomalous behavior. However, Live Baiting has two limitations. First, the detection algorithm adopted in Live Baiting starts with a suspects list containing all clients, which leads to a high false positive probability especially for large web service with a huge number of clients. Second, Live Baiting adopts a fixed threshold based on the expected number of requests in each bucket during the detection interval without the consideration of daily and weekly traffic variations. In order to address the above limitations, we first distinguish the clients activities (Active and Non-Active clients during the detection interval) in the detection process and then further propose a new adaptive threshold based on the Change Point Detection method, such that we can improve the false positive probability and avoid the dependence of detection on sites and access patterns. Extensive trace-driven simulation has been conducted on real Web trace to demonstrate the detection efficiency of the proposed scheme in comparison with the Live Baiting detection scheme.

  5. A novel error detection due to joint CRC aided denoise-and-forward network coding for two-way relay channels.

    PubMed

    Cheng, Yulun; Yang, Longxiang

    2014-01-01

    In wireless two-way (TW) relay channels, denoise-and-forward (DNF) network coding (NC) is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP). To handle this issue, a novel joint cyclic redundancy code (CRC) check method (JCRC) is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold. PMID:25247205

  6. Wind generated by an attacking bat: anemometric measurements and detection by the praying mantis cercal system.

    PubMed

    Triblehorn, Jeffrey D; Yager, David D

    2006-04-01

    The wind-sensitive cercal system, well-known for mediating terrestrial escape responses, may also mediate insect aerial bat-avoidance responses triggered by wind generated by the approaching bat. One crucial question is whether enough time exists between detection and capture for the insect to perform a successful evasive maneuver. A previous study estimated this time to be 16 ms, based on cockroach behavioral latencies and a prediction for the detection time derived from a simulated predator moving toward a simulated prey. However, the detection time may be underestimated since both the simulated predator and prey lacked certain characteristics present in the natural situation. In the present study, actual detection times are measured by recording from wind-sensitive interneurons of a tethered praying mantis that serves as the target for a flying, attacking bat. Furthermore, using hot-wire anemometry, we describe and quantify the wind generated by an attacking bat. Anemometer measurements revealed that the velocity of the bat-generated wind consistently peaks early with a high acceleration component (an important parameter for triggering wind-mediated terrestrial responses). The physiological recordings determined that the mantis cercal system detected an approaching bat 74 ms before contact, which would provide the insect with 36 ms to perform a maneuver before capture. This should be sufficient time for the mantis to respond. Although it probably would not have time for a full response that completely evades the bat, even a partial response might alter the mantid's trajectory enough to cause the bat to mishandle the insect, allowing it to escape. PMID:16574803

  7. Seismic ruggedness of relays

    SciTech Connect

    Merz, K.L. )

    1991-08-01

    This report complements EPRI report NP-5223 Revision 1, February 1991, and presents additional information and analyses concerning generic seismic ruggedness of power plant relays. Existing and new test data have been used to construct Generic Equipment Ruggedness Spectra (GERS) which can be used in identifying rugged relays during seismic re-evaluation of nuclear power plants. This document is an EPRI tier 1 report. The results of relay fragility tests for both old and new relays are included in an EPRI tier 2 report with the same title. In addition to the presentation of relay GERS, the tier 2 report addresses the applicability of GERS to relays of older vintage, discusses the important identifying nomenclature for each relay type, and examines relay adjustment effects on seismic ruggedness. 9 refs., 3 figs, 1 tab.

  8. A configurable-hardware document-similarity classifier to detect web attacks.

    SciTech Connect

    Ulmer, Craig D.; Gokhale, Maya

    2010-04-01

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to reconfigurable hardware. The TFIDF classifier is used to detect web attacks in HTTP data. In our reconfigurable hardware approach, we design a streaming, real-time classifier by simplifying an existing sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. We have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires two orders of magnitude less memory than the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  9. Graphene quantum dots FRET based sensor for early detection of heart attack in human.

    PubMed

    Bhatnagar, Deepika; Kumar, Vanish; Kumar, Ashok; Kaur, Inderpreet

    2016-05-15

    Cardiac immunosensor for early detection of heart attack (myocardial infarction) was developed using amine functionalized graphene quantum dots (afGQDs) conjugated with antibody anti-cardiac Troponin I (anti-cTnI) to detect cardiac marker antigen Troponin I (cTnI) in blood based on fluorescence resonance energy transfer (FRET) between conjugate and graphene (quencher) only in 10 min. The anti-cTnI was covalently conjugated to afGQDs through carbodiimide coupling reaction. The conjugate was characterized by zeta potential UV-vis spectroscopy and field emission scanning electron microscopy (FESEM). The sensing performance of the sensor was studied with respect to changes in the photon count and photoluminescence of GQDs based on interaction of target cTnI with its specific anti-cTnI antibody. The sensor is highly specific and shows negligible response to non-specific antigens. The sensor displayed a linear response to cTnI from 0.001 to 1000 ng mL(-1) with a limit of detection of 0.192 pg mL(-1). PMID:26748366

  10. A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks

    SciTech Connect

    Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

    2008-02-01

    The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

  11. Efficient live face detection to counter spoof attack in face recognition systems

    NASA Astrophysics Data System (ADS)

    Biswas, Bikram Kumar; Alam, Mohammad S.

    2015-03-01

    Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.

  12. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    PubMed

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes. PMID:27189623

  13. Protective relaying performance reporting

    SciTech Connect

    Taylor, R.P.; Ingelson, J.W.; Arnold, P.F.; Babcock, G.; Burzese, A.A.; Cornelison, J.R.; Drum, P.R.; Hasenwinkle, I.; Johnson, R.; Marsh, W. J. Jr.

    1992-10-01

    This paper reports on the performance of protective relaying systems which is an issue within the electric power industry which has received inadequate attention. The wide variations in relaying types and styles and applications, as well as differences in company structures and industry terminology, have hindered the adoption of a standardized system for the evaluation of protective relaying system performance. Such a system, if adopted by a significant portion of the industry, would provide suppliers and users better information with which to improve the product and its application and operation. The Protective Relaying Performance Criteria Working Group of the IEEE Power System Relaying Committee has generated this paper for the purpose of defining a standardized protective relaying performance reporting system.

  14. Optimised secure transmission through untrusted AF relays using link adaptation

    NASA Astrophysics Data System (ADS)

    Taki, Mehrdad; Sadeghi, Mohammad

    2016-05-01

    A new transmission scheme is presented for a two-hop relay network including two AF relays, considering physical layer security where relays are not able to detect signal with an acceptable bit error rate (BER) but the combined received signal is detected with an acceptable BER at the final receiver. It is assumed that there is no direct path between the transmitter and the receiver (relay network without diversity). Adaptive modulation and coding is utilised at the transmitter and transmission powers of the transmitter and of the relays are continuously adapted provisioning individual average power constraint for each node. Numerical evaluations show that an acceptable performance degradation is seen by the proposed secure relaying scheme compared to the optimum relay selection scheme without security constraint.

  15. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  16. A Simple Cooperative Relaying with Alamouti Coded Transmission

    NASA Astrophysics Data System (ADS)

    Yamaoka, Tomoya; Hara, Yoshitaka; Fukui, Noriyuki; Kubo, Hiroshi; Yamazato, Takaya

    Cooperative diversity using space-time codes offers effective space diversity with low complexity, but the scheme needs the space-time coding process in the relay nodes. We propose a simple cooperative relay scheme that uses space-time coding. In the scheme, the source node transmits the Alamouti coded signal sequences and the sink node receives the signal sequence via the two coordinated relay nodes. At the relay nodes, the operation procedure is just permutation and forwarding of the signal sequence. In the proposed scheme, none of the relay nodes need quadrature detection and space-time coding and the simple relay process offers effective space diversity. Moreover, simulations show the effectiveness of the proposed relay process by some simulations.

  17. MAVEN Relay Operations Concept

    NASA Technical Reports Server (NTRS)

    Chamberlain, Neil; Gladden, Roy; Bruvold, Kris

    2012-01-01

    The Mars Atmosphere and Volatile EvolutioN (MAVEN) mission will launch in late 2013 and following a 10 month cruise to Mars, will study the upper atmosphere of the planet. In addition to the science instruments, the MAVEN spacecraft is equipped with an Electra UHF transceiver to support relay communication with landed assets. This paper describes how UHF relay service is provisioned by MAVEN. The discussion includes a description of the Electra payload, the process by which relay activities are coordinated and accounted for, the process of a typical relay session, including uplink and downlink, as well as special commands to calibrate and verify relay performance. The operational processes for providing these services are inherited largely from prior Mars missions and take advantage of existing infrastructure and lessons learned from those missions. Preliminary data volume return capabilities using adaptive data rates and low-density parity check channel coding are presented.

  18. Relay Sequence Generation Software

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Khanampompan, Teerapat

    2009-01-01

    Due to thermal and electromagnetic interactivity between the UHF (ultrahigh frequency) radio onboard the Mars Reconnaissance Orbiter (MRO), which performs relay sessions with the Martian landers, and the remainder of the MRO payloads, it is required to integrate and de-conflict relay sessions with the MRO science plan. The MRO relay SASF/PTF (spacecraft activity sequence file/ payload target file) generation software facilitates this process by generating a PTF that is needed to integrate the periods of time during which MRO supports relay activities with the rest of the MRO science plans. The software also generates the needed command products that initiate the relay sessions, some features of which are provided by the lander team, some are managed by MRO internally, and some being derived.

  19. Development of means-of-detection for remote attacks on computer network hosts

    NASA Astrophysics Data System (ADS)

    Vilchevsky, Nikita O.; Gaydar, Michael B.; Klavdiev, Vladimir E.

    2004-04-01

    In this contribution we report on a problem of defense construction against an attack, with "Substitution of one of the TCP-connection subjects in the Internet (hijacking)," carried out for the first time by Kevin Mitnik (December 12, 1994) and which remains its potential danger till now. In this work the mathematical models of the remote attacks represented in earlier publications are expanded and specified.

  20. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  1. Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system.

    PubMed

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S V

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  2. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    PubMed Central

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  3. Multifunction protective relay

    NASA Astrophysics Data System (ADS)

    Harlow, J.; Yalla, M.; Kantor, J.

    1991-11-01

    Since the enactment of the National Energy Act of 1979, many private energy producers have been planning and building small generation and cogeneration facilities in order to sell power to the local utility. Many of the non-utility generators built after 1979 are connected directly to the closest utility distribution circuit. Aware of the problems associated with connecting generators in this manner, electric utilities across the country developed specifications and standards to allow safe and reliable interconnection. The report describes a malfunction protective relay which uses state-of-the-art digital signal processing procedures to accomplish the objective of providing most of the relay requirements of utility electrical interconnections. The relay has been demonstrated to be suitable for this critical application through extensive laboratory and in-service field testing. The relay, incorporating thirteen distinct protection functions affords the user the savings of the initial capital cost plus simplicity of installation and use.

  4. Fully relayed regenerative amplifier

    DOEpatents

    Glass, Alexander J.

    1981-01-01

    A regenerative laser apparatus and method using the optical relay concept to maintain high fill factors, to suppress diffraction effects, and to minimize phase distortions in a regenerative amplifier.

  5. Multi-Step Attack Detection via Bayesian Modeling under Model Parameter Uncertainty

    ERIC Educational Resources Information Center

    Cole, Robert

    2013-01-01

    Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…

  6. Heart attack

    MedlinePlus

    ... infarction; Non-ST-elevation myocardial infarction; NSTEMI; CAD-heart attack; Coronary artery disease-heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  7. DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments

    PubMed Central

    Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205

  8. Advance of the Ground Relay of the Line Protection

    NASA Astrophysics Data System (ADS)

    Inukai, Michihiko; Nishida, Tadashi; Noro, Jun; Matsuda, Akihiro

    This paper describes the advance of the ground relay of the line protection. First of all, we examined the ground fault in a resistively grounded power system. The protective relay detects the ground fault by the zero phase current in the system. There are two methods for the current input to the relay. One uses the residual circuit of CT secondary winding, and the other uses the CT tertiary winding. When the ground current is insufficient in the residual circuit, the CT tertiary winding is used. In order to omit the CT tertiary winding and to get more reliability, we reviewed the full-scale of relay and evaluating the error of CT. As result, almost all transmission lines could omit the CT tertiary winding. Next, we examined the ground fault with high fault resistance in a solidly grounded power system. When that fault occurs in the system, the PCM current differential relay acts by fault current. So, this relay possibly mal-operates when the CT secondary circuit is disconnected. Therefore, it uses a special CT to raise the reliability. Nowadays GIS has become small and the CT installation space has been decreased, it is needed to reduce these CT cores. In order to omit the special CT, we utilized the combination of the power relay and the rate of change of relay current. As a result, there is a prospect that the relay would not need the special CT. These improvements are effective to reduce cost too.

  9. Quantum network with trusted and untrusted relays

    NASA Astrophysics Data System (ADS)

    Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen

    2012-02-01

    Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.

  10. Internet Relay Chat.

    ERIC Educational Resources Information Center

    Simpson, Carol

    2000-01-01

    Describes Internet Relay Chats (IRCs), electronic conversations over the Internet that allow multiple users to write messages, and their applications to educational settings such as teacher collaboration and conversations between classes. Explains hardware and software requirements, IRC organization into nets and channels, and benefits and…

  11. Latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes at least one permanent magnet and at least one electromagnet. The respective sections are, generally, arranged in separate locations or cavities in the assembly. The switch is latched by a permanent magnet assembly and selectively switched by an overriding electromagnetic assembly.

  12. Improved relay chatter detector

    NASA Technical Reports Server (NTRS)

    Reynolds, R. K.

    1971-01-01

    Detector provides go/no-go sensing of momentary relay or contact opening during vibration testing. Device compares duration of unwanted openings to calibrated standard and lights indicator if standard is exceeded. Stability and reliability are higher than in any other comparable device.

  13. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  14. System response to relay chatter

    SciTech Connect

    Antaki, G.A.; Radder, J.A.

    1992-01-01

    An important aspect of the qualification of safety related systems, is the assessment of the possibility and consequences of seismic or vibration induced relay chatter. The current rules, contained in ANSI/IEEE C37.98 and the SQUG GIP, consider as seismic induced failure'' of a relay, a chatter contact in excess of 2 milliseconds. While this rule is clear in defining failure'' of single relay, the definition of failure'' becomes more problematic when we consider the alignment of an assembly of relays in series or parallel, and the effects of chatter on the function of the system in which the relays are mounted. In this paper, we report a method, based on system test and probabilities analysis, used to assess failure'' by relay chatter in an assembly of relays which control an electric motor. 2 refs.

  15. System response to relay chatter

    SciTech Connect

    Antaki, G.A.; Radder, J.A.

    1992-05-01

    An important aspect of the qualification of safety related systems, is the assessment of the possibility and consequences of seismic or vibration induced relay chatter. The current rules, contained in ANSI/IEEE C37.98 and the SQUG GIP, consider as seismic induced ``failure`` of a relay, a chatter contact in excess of 2 milliseconds. While this rule is clear in defining ``failure`` of single relay, the definition of ``failure`` becomes more problematic when we consider the alignment of an assembly of relays in series or parallel, and the effects of chatter on the function of the system in which the relays are mounted. In this paper, we report a method, based on system test and probabilities analysis, used to assess ``failure`` by relay chatter in an assembly of relays which control an electric motor. 2 refs.

  16. Heart Attack

    MedlinePlus

    ... attack treatment works best when it's given right after symptoms occur. Prompt treatment of a heart attack can help prevent or limit damage to the heart and prevent sudden death. Call 9-1-1 Right Away A heart ...

  17. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Taeghyoon; Choi, Seokjin; Lee, Cheolwon

    Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems. It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed continuously. In this paper, we propose a novel methodology that can detect obfuscated strings in the malicious web pages. We extracted three metrics as rules for detecting obfuscated strings by analyzing patterns of normal and malicious JavaScript codes. They are N-gram, Entropy, and Word Size. N-gram checks how many each byte code is used in strings. Entropy checks distributed of used byte codes. Word size checks whether there is used very long string. Based on the metrics, we implemented a practical tool for our methodology and evaluated it using read malicious web pages. The experiment results showed that our methodology can detect obfuscated strings in web pages effectively.

  18. Relaying an optical wavefront

    DOEpatents

    Sweatt, William C.; Vawter, G. Allen

    2007-03-06

    A wavefront rely devices samples an incoming optical wavefront at different locations, optically relays the samples while maintaining the relative position of the samples and the relative phase between the samples. The wavefront is reconstructed due to interference of the samples. Devices can be designed for many different wavelengths, including for example the ultraviolet, visible, infrared and even longer wavelengths such as millimeter waves. In one application, the device function as a telescope but with negligible length.

  19. Detection of the sarin hydrolysis product in formalin-fixed brain tissues of victims of the Tokyo subway terrorist attack.

    PubMed

    Matsuda, Y; Nagao, M; Takatori, T; Niijima, H; Nakajima, M; Iwase, H; Kobayashi, M; Iwadate, K

    1998-06-01

    One of the hydrolysis products of sarin (isopropyl methylphosphonofluoridate) was detected in formalin-fixed brain tissues of victims poisoned in the Tokyo subway terrorist attack. Part of this procedure, used for the detection of sarin hydrolysis products in erythrocytes of sarin victims, has been described previously. The test materials were four individual cerebellums, which had been stored in formalin fixative for about 2 years. Sarin-bound acetylcholinesterase (AChE) was solubilized from these cerebellums, purified by immunoaffinity chromatography, and digested with trypsin. Then the sarin hydrolysis products bound to AChE were released by alkaline phosphatase digestion, subjected to trimethylsilyl derivatization (TMS), and detected by gas chromatography-mass spectrometry. Peaks at m/z 225 and m/z 240, which are indicative of TMS-methylphosphonic acid, were observed within the retention time range of authentic methylphosphonic acid. However, no isopropyl methylphosphonic acid was detected in the formalin-fixed cerebellums of these 4 sarin victims, probably because the isopropoxy group of isopropyl methylphosphonic acid underwent chemical hydrolysis during storage. This procedure will be useful for the forensic diagnosis of poisoning by protein-bound, highly toxic agents, such as sarin, which are easily hydrolysed. This appears to be the first time that intoxication by a nerve agent has been demonstrated by analyzing formalin-fixed brains obtained at autopsy. PMID:9653062

  20. Comparison of spatial frequency domain features for the detection of side attack explosive ballistics in synthetic aperture acoustics

    NASA Astrophysics Data System (ADS)

    Dowdy, Josh; Anderson, Derek T.; Luke, Robert H.; Ball, John E.; Keller, James M.; Havens, Timothy C.

    2016-05-01

    Explosive hazards in current and former conflict zones are a threat to both military and civilian personnel. As a result, much effort has been dedicated to identifying automated algorithms and systems to detect these threats. However, robust detection is complicated due to factors like the varied composition and anatomy of such hazards. In order to solve this challenge, a number of platforms (vehicle-based, handheld, etc.) and sensors (infrared, ground penetrating radar, acoustics, etc.) are being explored. In this article, we investigate the detection of side attack explosive ballistics via a vehicle-mounted acoustic sensor. In particular, we explore three acoustic features, one in the time domain and two on synthetic aperture acoustic (SAA) beamformed imagery. The idea is to exploit the varying acoustic frequency profile of a target due to its unique geometry and material composition with respect to different viewing angles. The first two features build their angle specific frequency information using a highly constrained subset of the signal data and the last feature builds its frequency profile using all available signal data for a given region of interest (centered on the candidate target location). Performance is assessed in the context of receiver operating characteristic (ROC) curves on cross-validation experiments for data collected at a U.S. Army test site on different days with multiple target types and clutter. Our preliminary results are encouraging and indicate that the top performing feature is the unrolled two dimensional discrete Fourier transform (DFT) of SAA beamformed imagery.

  1. Detection of beamsplitting attack in a quantum cryptographic channel based on photon number statistics monitoring

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2014-10-01

    Quantum cryptography in theory allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source. In order to overcome this possibility, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. We present an alternative method based on monitoring photon number statistics after detection. This method can therefore be used with any existing protocol.

  2. Heart attack

    MedlinePlus

    ... a heart attack take part in a cardiac rehabilitation program. ... al. eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  3. Characteristics of Vector Surge Relays for Distributed Synchronous Generator Protection

    SciTech Connect

    Freitas, Walmir; Xu, Wilsun; Huang, Zhenyu; Vieira, Jose C.

    2007-02-28

    This work presented a detailed investigation on the performance characteristics if vector surge relays to detect islanding of distributed synchronous generators. A detection time versus active power imbalance curve is proposed to evaluate the relay performance. Computer simulations are used to obtain the performance curves. The concept of critical active power imbalance is introduced based on these curves. Main factors affecting the performance of the relays are analyzed. The factors investigated are voltage-dependent loads, load power factor, inertia constant of the generator, generator excitation system control mode, feeder length and R/X ratio as well as multi-distributed generators. The results are a useful guideline to evaluate the effectiveness of anti-islanding schemes based on vector surge relays for distributed generation applications.

  4. Relay mirror experiment

    NASA Astrophysics Data System (ADS)

    Begley, David L.

    1996-04-01

    Originating out of a SDIO-funded, Phase 1 study effort, two ground systems and an orbiting EO payload/spacecraft were the primary equipment for the RME. The RME was originally conceived to be a shuttle deployed experiment. Shortly after program start, the Challenger disaster occurred, with the promise of extensive delays. A completely new space segment was to be designed incorporating a free-flying spacecraft. During the midphase of the program, a variety of launch vehicles were envisioned to replace the shuttle, requiring the BASD team to design accommodations for Delta, Atlas, and Titan, with a Delta launch being the final solution. The ground systems tracked the spacecraft and illuminated it with green and blue beacon lasers. The Payload Experiment Package (PEP) housed the bisection tracker, a key innovation central to the experiment. The bisection tracker acquired both beacons and controlled steerable mirrors to accomplish fine tracking of the two cooperative beacons. In the process, the relay mirror was precisely positioned to enable a successful relay of a third infrared laser between the two ground sites via the orbiting spacecraft. Many of the key technologies employed in the PEP were originally developed for Ball laser communications research and development programs and other laser pointing efforts. The WAVE sensor package, built by ATA and integrated by Ball, measured the vibrations of the optical base structure on which it was mounted. These spacecraft vibration data are critical to the accurate pointing of space laser communication terminals.

  5. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  6. A high-sensitivity optical device for the early monitoring of plant pathogen attack via the in vivo detection of ROS bursts

    PubMed Central

    Zeng, Lizhang; Zhou, Jun; Li, Bo; Xing, Da

    2015-01-01

    Biotic stressors, especially pathogenic microorganisms, are rather difficult to detect. In plants, one of the earliest cellular responses following pathogen infection is the production of reactive oxygen species (ROS). In this study, a novel optical device for the early monitoring of Pseudomonas attack was developed; this device measures the ROS level via oxidation-sensitive 2′, 7′-dichlorodihydrofluorescein diacetate (H2DCFDA)-mediated fluorescence, which could provide early monitoring of attacks by a range of plant pathogen; ROS bursts were detected in vivo in Arabidopsis thaliana with higher sensitivity and accuracy than those of a commercial luminescence spectrophotometer. Additionally, the DCF fluorescence truly reflected early changes in the ROS level, as indicated by an evaluation of the H2O2 content and the tight association between the ROS and Pseudomonas concentration. Moreover, compared with traditional methods for detecting plant pathogen attacks based on physiological and biochemical measurements, our proposed technique also offers significant advantages, such as low cost, simplicity, convenient operation and quick turnaround. These results therefore suggest that the proposed optical device could be useful for the rapid monitoring of attacks by plant pathogen and yield results considerably earlier than the appearance of visual changes in plant morphology or growth. PMID:25767474

  7. Heart Attack

    MedlinePlus

    ... lower “bad” cholesterol (also called LDL, or low-density lipoprotein) levels and may help increase “good” cholesterol (also called HDL, or high-density lipoprotein). If you have had a heart attack, ...

  8. Radio Relays Improve Wireless Products

    NASA Technical Reports Server (NTRS)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  9. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  10. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... warning system shall be tested at least once every four years. (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with soft iron magnetic structure shall be tested at least once every two years. (2) Alternating current centrifugal type relays shall be tested at least...

  11. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  12. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... warning system shall be tested at least once every four years. (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with soft iron magnetic structure shall be tested at least once every two years. (2) Alternating current centrifugal type relays shall be tested at least...

  13. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  14. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  15. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... warning system shall be tested at least once every four years. (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with soft iron magnetic structure shall be tested at least once every two years. (2) Alternating current centrifugal type relays shall be tested at least...

  16. Laser Relay: Improving Space Communications

    NASA Video Gallery

    The Laser Communications Relay Demonstration mission proposes to revolutionize the way we send and receive data, video and other information, using lasers to encode and transmit data at rates 10 to...

  17. The power relay satellite

    NASA Astrophysics Data System (ADS)

    Glaser, Peter E.

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  18. PHOTOSENSITIVE RELAY CONTROL CIRCUIT

    DOEpatents

    Martin, C.F.

    1958-01-14

    adapted for the measurement of the time required for an oscillating member to pass through a preselected number of oscillations, after being damped to a certain maximum amplitude of oscillation. A mirror is attached to the moving member and directs light successively to a photocell which is part of a trigger unit and to first and second photocells which are part of a starter unit, as the member swings to its maximum amplitude. The starter and trigger units comprise thyratrons and relays so interconnected that the trigger circuit, although generating a counter pulse, does not register a count in the counter when the light traverses both photocells of the starter unit. When the amplitude of oscillation of the member decreases to where the second photocell is not transversed, the triggei pulse is received by the counter. The counter taen operates to register the desired number of oscillations and initiates and terminates a timer for measuring the time irterval for the preselected number of oscillations.

  19. Heart Attack

    MedlinePlus

    ... have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get help immediately. It's ... few hours causes the affected heart muscle to die. NIH: National Heart, Lung, and Blood Institute

  20. Formulas for predicting the dynamic performance of ROCOF relays for embedded generation applications

    SciTech Connect

    Vieira, J.C. M.; Freitas, Walmir; Huang, Zhenyu; Xu, Wilsun; Morelato, A.

    2006-07-13

    A set of formulas directly predict the performance of rate-of-change-of-frequency (ROCOF) relays used to detect islanding of embedded synchronous generators. The formulas are analytically derived from the dynamic model of the generator and relay. Dynamic simulation results obtained using a representative distribution system confirm the validity and accuracy. The formulas presented are a useful tool for protection engineers; they can be used, for example, to assess the effectiveness of anti-islanding schemes based on ROCOF relays, or to assist the selection of relay settings, significantly reducing the number of repeated dynamic simulations necessary to carry out such studies.

  1. EAGLE: relay mirror technology development

    NASA Astrophysics Data System (ADS)

    Hartman, Mary; Restaino, Sergio R.; Baker, Jeffrey T.; Payne, Don M.; Bukley, Jerry W.

    2002-06-01

    EAGLE (Evolutionary Air & Space Global Laser Engagement) is the proposed high power weapon system with a high power laser source, a relay mirror constellation, and the necessary ground and communications links. The relay mirror itself will be a satellite composed of two optically-coupled telescopes/mirrors used to redirect laser energy from ground, air, or space based laser sources to distant points on the earth or space. The receiver telescope captures the incoming energy, relays it through an optical system that cleans up the beam, then a separate transmitter telescope/mirror redirects the laser energy at the desired target. Not only is it a key component in extending the range of DoD's current laser weapon systems, it also enables ancillary missions. Furthermore, if the vacuum of space is utilized, then the atmospheric effects on the laser beam propagation will be greatly attenuated. Finally, several critical technologies are being developed to make the EAGLE/Relay Mirror concept a reality, and the Relay Mirror Technology Development Program was set up to address them. This paper will discuss each critical technology, the current state of the work, and the future implications of this program.

  2. Sealed reed relay limit switches

    NASA Astrophysics Data System (ADS)

    Ivanov, I. P.; Svintsov, G. P.; Yefimova, M. A.; Lebedev, A. V.; Samsonov, Y. P.

    1986-01-01

    Sealed reed relay limit switches are described which overcome the inherent deficiencies traditionally present in these devices: high material, labor consumption, and difficult operation. Series VSG limit switches developed at the All-Union Scientific Research and Technological Planning Institute for Relay Engineering (Cheboksary) for use in buildings are described. The VSG1 has a single switching contact, the VSG2 a single normally open contact, and the VSG3 a single normally closed contact. The VSG1 employs type MKS-27103 sealed reed relays, while the VSG2 and VSG3 employ KEM-1 reed relays. The magnet system, which consists of magnets and a plate, and the sealed reed relay are contained in a nonmagnetic casing with a slit in it. The mathematical expression defining the geometric dimensions of the magnet system is given. The basic parameteres of all three types of switches are tabulated. The VSG series switches can be used to replace VBK and BVK switches, thus saving electricity, labor, and materials, including silver.

  3. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  4. Satellite Relaying of Geophysical Data

    NASA Technical Reports Server (NTRS)

    Allenby, R. J.

    1977-01-01

    Data Collection Platforms (DCPs) for transmitting surface data to an orbiting satellite for relaying to a central data distribution center are being used in a number of geophysical applications. "Off-the-shelf" DCP's, transmitting through Landsat or GOES satellites, are fully capable of relaying data from low-data-rate instruments, such as tiltmeters or tide gauges. In cooperation with the Lamont-Doherty Geological Observatory, Goddard has successfully installed DCP systems on a tide gauge and tiltmeter array on Anegada, British Virgin Islands. Because of the high-data-rate requirements, a practical relay system capable of handling seismic information is not yet available. Such a system could become the basis of an operational hazard prediction system for reducing losses due to major natural catastrophies such as earthquakes, volcanic eruptions, landslides or tsunamis.

  5. Rotation frequency relay for hydrogenerator

    SciTech Connect

    Matveev, V.V.

    1980-09-01

    The rotation frequency relay (RFR) is one of the most critical elements of automatic control system of the hydrogenerators. Accurate fixing of braking, subsynchronous and acceleration angular speeds contribute to operational reliability of many units of mechanical and electrical parts of the hydrogenerator and vise versa. Both experimental and theoretical investigations were performed on hydrogenerators. It was concluded that the rotation frequency relay, where an integrated voltage of the regulator generator is used as reference voltage and the elements of comparison are executed on the operating amplifiers, has a fairly high accuracy and stability of settings, and practically does not require regulation for manufacture and operation.

  6. Performance limitations of relay neurons.

    PubMed

    Agarwal, Rahul; Sarma, Sridevi V

    2012-01-01

    Relay cells are prevalent throughout sensory systems and receive two types of inputs: driving and modulating. The driving input contains receptive field properties that must be transmitted while the modulating input alters the specifics of transmission. For example, the visual thalamus contains relay neurons that receive driving inputs from the retina that encode a visual image, and modulating inputs from reticular activating system and layer 6 of visual cortex that control what aspects of the image will be relayed back to visual cortex for perception. What gets relayed depends on several factors such as attentional demands and a subject's goals. In this paper, we analyze a biophysical based model of a relay cell and use systems theoretic tools to construct analytic bounds on how well the cell transmits a driving input as a function of the neuron's electrophysiological properties, the modulating input, and the driving signal parameters. We assume that the modulating input belongs to a class of sinusoidal signals and that the driving input is an irregular train of pulses with inter-pulse intervals obeying an exponential distribution. Our analysis applies to any [Formula: see text] order model as long as the neuron does not spike without a driving input pulse and exhibits a refractory period. Our bounds on relay reliability contain performance obtained through simulation of a second and third order model, and suggest, for instance, that if the frequency of the modulating input increases or the DC offset decreases, then relay increases. Our analysis also shows, for the first time, how the biophysical properties of the neuron (e.g. ion channel dynamics) define the oscillatory patterns needed in the modulating input for appropriately timed relay of sensory information. In our discussion, we describe how our bounds predict experimentally observed neural activity in the basal ganglia in (i) health, (ii) in Parkinson's disease (PD), and (iii) in PD during therapeutic deep

  7. Integral testing of relays and circuit breakers

    SciTech Connect

    Bandyopadhyay, K.K.

    1993-12-31

    Among all equipment types considered for seismic qualification, relays have been most extensively studied through testing due to a wide variation of their designs and seismic capacities. A temporary electrical discontinuity or ``chatter`` is the common concern for relays. A chatter duration of 2 milliseconds is typically used as an acceptance criterion to determine the seismic capability of a relay. Many electrical devices, on the other hand, receiving input signals from relays can safely tolerate a chatter level much greater than 2 ms. In Phase I of a test program, Brookhaven National Laboratory performed testing of many relay models using the 2-ms chatter criterion. In Phase II of the program, the factors influencing the relay chatter criterion, and impacts of relay chatter on medium and low voltage circuit breakers and lockout relays were investigated. This paper briefly describes the Phase II tests and presents the important observations.

  8. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending on spring tension to return contacts to deenergized position in noncoded continuous inductive...

  9. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending on spring tension to return contacts to deenergized position in noncoded continuous inductive...

  10. Heart Attack Risk Assessment

    MedlinePlus

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  11. STBC AF relay for unmanned aircraft system

    NASA Astrophysics Data System (ADS)

    Adachi, Fumiyuki; Miyazaki, Hiroyuki; Endo, Chikara

    2015-01-01

    If a large scale disaster similar to the Great East Japan Earthquake 2011 happens, some areas may be isolated from the communications network. Recently, unmanned aircraft system (UAS) based wireless relay communication has been attracting much attention since it is able to quickly re-establish the connection between isolated areas and the network. However, the channel between ground station (GS) and unmanned aircraft (UA) is unreliable due to UA's swing motion and as consequence, the relay communication quality degrades. In this paper, we introduce space-time block coded (STBC) amplify-and-forward (AF) relay for UAS based wireless relay communication to improve relay communication quality. A group of UAs forms single frequency network (SFN) to perform STBC-AF cooperative relay. In STBC-AF relay, only conjugate operation, block exchange and amplifying are required at UAs. Therefore, STBC-AF relay improves the relay communication quality while alleviating the complexity problem at UAs. It is shown by computer simulation that STBC-AF relay can achieve better throughput performance than conventional AF relay.

  12. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  13. The magic of relay mirrors

    NASA Astrophysics Data System (ADS)

    Duff, Edward A.; Washburn, Donald C.

    2004-09-01

    Laser weapon systems would be significantly enhanced with the addition of high altitude or space-borne relay mirrors. Such mirrors, operating alone with a directed energy source, or many in a series fashion, can be shown to effectively move the laser source to the last, so-called fighting mirror. This "magically" reduces the range to target and offers to enhance the performance of directed energy systems like the Airborne Laser and even ground-based or ship-based lasers. Recent development of high altitude airships will be shown to provide stationary positions for such relay mirrors thereby enabling many new and important applications for laser weapons. The technical challenges to achieve this capability are discussed.

  14. Energy efficient circuit design using nanoelectromechanical relays

    NASA Astrophysics Data System (ADS)

    Venkatasubramanian, Ramakrishnan

    Nano-electromechanical (NEM) relays are a promising class of emerging devices that offer zero off-state leakage and behave like an ideal switch. Recent advances in planar fabrication technology have demonstrated that microelectromechanical (MEMS) scale miniature relays could be manufactured reliably and could be used to build fully functional, complex integrated circuits. The zero leakage operation of relays has renewed the interest in relay based low power logic design. This dissertation explores circuit architectures using NEM relays and NEMS-CMOS heterogeneous integration. Novel circuit topologies for sequential logic, memory, and power management circuits have been proposed taking into consideration the NEM relay device properties and optimizing for energy efficiency and area. In nanoscale electromechanical devices, dispersion forces like Van der Waals' force (vdW) affect the pull-in stability of the relay devices significantly. Verilog-A electromechanical model of the suspended gate relay operating at 1V with a nominal air gap of 5 - 10nm has been developed taking into account all the electrical, mechanical and dispersion effects. This dissertation explores different relay based latch and flip-flop topologies. It has been shown that as few as 4 relay cells could be used to build flip-flops. An integrated voltage doubler based flip flop that improves the performance by 2X by overdriving Vgb has been proposed. Three NEM relay based parallel readout memory bitcell architectures have been proposed that have faster access time, and remove the reliability issues associated with previously reported serial readout architectures. A paradigm shift in design of power switches using NEM relays is proposed. An interesting property of the relay device is that the ON state resistance (Ron) of the NEM relay switch is constant and is insensitive to the gate slew rate. This coupled with infinite OFF state resistance (Roff ) offers significant area and power advantages over CMOS

  15. Heart Attack Recovery FAQs

    MedlinePlus

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  16. Experimental evaluation of earthquake induced relay chattering

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.; Shteyngart, S.

    1990-01-01

    An experimental evaluation of relay performance under vibratory environments is discussed in this paper. Single frequency excitation was used for most tests. Limited tests were performed with random multifrequency inputs. The capacity of each relay was established based on a two-millisecond chatter criterion. The experimental techniques are described and the effects of parameters in controlling the relay capacity levels are illustrated with test data. A wide variation of the capacity levels was observed due to the influence of parameters related to the design of the relay and nature of the input motion. 3 refs., 15 figs.

  17. Inhomogeneity induces relay synchronization in complex networks

    NASA Astrophysics Data System (ADS)

    Gambuzza, Lucia Valentina; Frasca, Mattia; Fortuna, Luigi; Boccaletti, Stefano

    2016-04-01

    Relay synchronization is a collective state, originally found in chains of interacting oscillators, in which uncoupled dynamical units synchronize through the action of mismatched inner nodes that relay the information but do not synchronize with them. It is demonstrated herein that relay synchronization is not limited to such simple motifs, rather it can emerge in larger and arbitrary network topologies. In particular, we show how this phenomenon can be observed in networks of chaotic systems in the presence of some mismatched units, the relay nodes, and how it is actually responsible for an enhancement of synchronization in the network.

  18. The Laser Communications Relay and the Path to the Next Generation Near Earth Relay

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2015-01-01

    NASA Goddard Space Flight Center is currently developing the Laser Communications Relay Demonstration (LCRD) as a Path to the Next Generation Near Earth Space Communication Network. The current NASA Space Network or Tracking and Data Relay Satellite System is comprised of a constellation of Tracking and Data Relay Satellites (TDRS) in geosynchronous orbit and associated ground stations and operation centers. NASA is currently targeting a next generation of relay capability on orbit in the 2025 timeframe.

  19. A multi-data source surveillance system to detect a bioterrorism attack during the G8 Summit in Scotland.

    PubMed

    Meyer, N; McMenamin, J; Robertson, C; Donaghy, M; Allardice, G; Cooper, D

    2008-07-01

    In 18 weeks, Health Protection Scotland (HPS) deployed a syndromic surveillance system to early-detect natural or intentional disease outbreaks during the G8 Summit 2005 at Gleneagles, Scotland. The system integrated clinical and non-clinical datasets. Clinical datasets included Accident & Emergency (A&E) syndromes, and General Practice (GPs) codes grouped into syndromes. Non-clinical data included telephone calls to a nurse helpline, laboratory test orders, and hotel staff absenteeism. A cumulative sum-based detection algorithm and a log-linear regression model identified signals in the data. The system had a fax-based track for real-time identification of unusual presentations. Ninety-five signals were triggered by the detection algorithms and four forms were faxed to HPS. Thirteen signals were investigated. The system successfully complemented a traditional surveillance system in identifying a small cluster of gastroenteritis among the police force and triggered interventions to prevent further cases. PMID:17678556

  20. A fuzzy-set approach to fault-type identification in digital relaying

    SciTech Connect

    Ferrero, A.; Sangiovanni, S.; Zappitelli, E.

    1995-01-01

    Sometime the operations that a relay is required to perform cannot be easily described in a deterministic way. A significant example of this situation is given by the operations a line relay must perform in order to detect the type of fault line-to-ground, line-to-line, line-to-line involving ground. Recently, the mathematical theory of fuzzy sets featured many practical applications, mainly in industrial controls, and fuzzy-set processors are available to allow real time applications. This paper shows that a fuzzy-set approach can be useful even in digital relaying, whenever ``fuzzy`` decisions have to be undertaken. A possible application to the detection of the type of fault when symmetrical component relaying techniques are adopted is proposed and the results of simulation tests are given.

  1. Trisphere spark gap actuates overvoltage relay

    NASA Technical Reports Server (NTRS)

    Camacho, S. L.

    1966-01-01

    Trisphere spark gap and high voltage relay provides a positive, fast response, high current capacity device that will sense an overvoltage condition and remove power from the circuit before insulation breakdown. When an overvoltage occurs, the spark gap breaks down and conducts an actuating current to the relay which removes power from the circuit.

  2. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  3. G. Marconi: A Data Relay Satellite for Mars Communications

    NASA Astrophysics Data System (ADS)

    Dionisio, C.; Marcozzi, M.; Landriani, C.

    2002-01-01

    Mars has always been a source of intrigue and fascination. Recent scientific discoveries have stimulated this longstanding interest, leading to a renaissance in Mars exploration. Future missions to Mars will be capable of long-distance surface mobility, hyperspectral imaging, subsurface exploration, and even life-detection. Manned missions and, eventually, colonies may follow. No mission to the Red Planet stands alone. New scientific and technological knowledge is passed on from one mission to the next, not only improving the journey into space, but also providing benefits here on Earth. The Mars Relay Network, an international constellation of Mars orbiters with relay radios, directly supports other Mars missions by relaying communications between robotic vehicles at Mars and ground stations on Earth. The ability of robotic visitors from Earth to explore Mars will take a gigantic leap forward in 2007 with the launch of the Guglielmo Marconi Orbiter (GMO), the first spacecraft primarily dedicated to providing communication relay, navigation and timing services at Mars. GMO will be the preeminent node of the Mars Relay Network. GMO will relay communications between Earth and robotic vehicles near Mars. GMO will also provide navigation services to spacecraft approaching Mars. GMO will receive transmissions from ground stations on Earth at X-band and will transmit to ground stations on Earth at X- and Ka-bands. GMO will transmit to robotic vehicles at Mars at UHF and receive from these vehicles at UHF and X-band. GMO's baseline 4450 km circular orbit provides complete coverage of the planet for telecommunication and navigation support. GMO will arrive at Mars in mid-2008, just before the NetLander and Mars Scout missions that will be its first users. GMO is designed for a nominal operating lifetime of 10 years and will support nominal commanding and data acquisition, as well as mission critical events such as Mars Orbit Insertion, Entry, Descent and Landing, and Mars

  4. Evolution of a radio communication relay system

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Pezeshkian, Narek; Hart, Abraham; Burmeister, Aaron; Holz, Kevin; Neff, Joseph; Roth, Leif

    2013-05-01

    Providing long-distance non-line-of-sight control for unmanned ground robots has long been recognized as a problem, considering the nature of the required high-bandwidth radio links. In the early 2000s, the DARPA Mobile Autonomous Robot Software (MARS) program funded the Space and Naval Warfare Systems Center (SSC) Pacific to demonstrate a capability for autonomous mobile communication relaying on a number of Pioneer laboratory robots. This effort also resulted in the development of ad hoc networking radios and software that were later leveraged in the development of a more practical and logistically simpler system, the Automatically Deployed Communication Relays (ADCR). Funded by the Joint Ground Robotics Enterprise and internally by SSC Pacific, several generations of ADCR systems introduced increasingly more capable hardware and software for automatic maintenance of communication links through deployment of static relay nodes from mobile robots. This capability was finally tapped in 2010 to fulfill an urgent need from theater. 243 kits of ruggedized, robot-deployable communication relays were produced and sent to Afghanistan to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the evolution of the radio relay technology at SSC Pacific, and then focuses on the latest two stages, the Manually-Deployed Communication Relays and the latest effort to automate the deployment of these ruggedized and fielded relay nodes.

  5. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  6. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Ohsita, Yuichi; Ata, Shingo; Murata, Masayuki

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  7. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in...

  8. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in...

  9. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  10. About Heart Attacks

    MedlinePlus

    ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ...

  11. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  12. ESA's advanced relay and technology mission

    NASA Astrophysics Data System (ADS)

    Lechte, H.; Bird, A. G.; van Holtz, L.; Oppenhauser, G.

    1990-05-01

    The Advanced Relay and Technology Mission is discussed. The objective of the mission is to develop, launch, and operate a single geostationary satellite. The proposed satellite includes advanced communications payloads with data-relay, mobile, and fixed-service applications. The semiconductor laser intersatellite link experiment (Silex), which is aimed at developing an optical communications data-relay system, is described. The Silex configuration is designed for LEO or GEO applications and has a 65 Mbit/s data rate over the optical return link. Consideration is given to the phased-array technology utilized in the S-band data-relay payload; the L-band land mobile payload; diagnostics and propagation packages; and technology experiments for improving the platform.

  13. Speech-to-Speech Relay Service

    MedlinePlus

    ... all forms of TRS, STS uses Communications Assistants (CAs) – to relay the conversation back and forth between ... and the other party to the call. STS CAs are operators who are specifically trained in understanding ...

  14. Trend of EMC Standards for Protective Relays

    NASA Astrophysics Data System (ADS)

    Matsumoto, Toshio; Suga, Noriyoshi; Seki, Masaya

    JEC-2501, a future JEC standard for protective relays' EMC environment is now under creation in conformance with related IEC's EMC standards and existing Japanese EMC standards. This paper describes history of EMC related standards for protective relays in Japan, Structure and meanings of IEC's EMC standards referred by JEC-2501, relation between EMC standards of IEC and those of Japan, and finally desirable way of creating future EMC standard in Japan.

  15. Airborne Relay-Based Regional Positioning System

    PubMed Central

    Lee, Kyuman; Noh, Hongjun; Lim, Jaesung

    2015-01-01

    Ground-based pseudolite systems have some limitations, such as low vertical accuracy, multipath effects and near-far problems. These problems are not significant in airborne-based pseudolite systems. However, the monitoring of pseudolite positions is required because of the mobility of the platforms on which the pseudolites are mounted, and this causes performance degradation. To address these pseudolite system limitations, we propose an airborne relay-based regional positioning system that consists of a master station, reference stations, airborne relays and a user. In the proposed system, navigation signals are generated from the reference stations located on the ground and are relayed via the airborne relays. Unlike in conventional airborne-based systems, the user in the proposed system sequentially estimates both the locations of airborne relays and his/her own position. Therefore, a delay due to monitoring does not occur, and the accuracy is not affected by the movement of airborne relays. We conducted several simulations to evaluate the performance of the proposed system. Based on the simulation results, we demonstrated that the proposed system guarantees a higher accuracy than airborne-based pseudolite systems, and it is feasible despite the existence of clock offsets among reference stations. PMID:26029953

  16. Relay testing parametric investigation of seismic fragility

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.; Kassir, M.; Pepper, S.

    1989-01-01

    The seismic capacity of most electrical equipment is governed by malfunction of relays. An evaluation of the existing relay test data base at Brookhaven National Laboratory (BNL) has indicated that the seismic fragility of a relay may depend on various parameters related to the design or the input motion. In particular, the electrical mode, contact state, adjustment, chatter duration acceptance limit, and the frequency and the direction of the vibration input have been considered to influence the relay fragility level. For a particular relay type, the dynamics of its moving parts depends on the exact model number and vintage and hence, these parameters may also influence the fragility level. In order to investigate the effect of most of these parameters on the seismic fragility level, BNL has conducted a relay test program. The testing has been performed at Wyle Laboratories. Establishing the correlation between the single frequency fragility test input and the corresponding multifrequency response spectrum (TRS) is also an objective of this test program. This paper discusses the methodology used for testing and presents a brief summary of important test results. 1 ref., 10 figs.

  17. Physical Layer Security Using Two-Path Successive Relaying

    PubMed Central

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  18. Physical Layer Security Using Two-Path Successive Relaying.

    PubMed

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  19. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (ESTSC)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  20. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    SciTech Connect

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We

  1. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  2. Ground wave emergency network environmental assessment for northwestern Colorado relay node site number RN 8C924CO

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  3. COMPASS Final Report: Lunar Relay Satellite (LRS)

    NASA Technical Reports Server (NTRS)

    Oleson, Steven R.; McGuire, Melissa L.

    2012-01-01

    The Lunar Relay Satellite (LRS) COllaborative Modeling and Parametric Assessment of Space Systems (COMPASS) session was tasked to design a satellite to orbit in an elliptical lunar polar orbit to provide relay communications between lunar South Pole assets and the Earth. The design included a complete master equipment list, power requirement list, configuration design, and brief risk assessment and cost analysis. The LRS is a half-TDRSS sized box spacecraft, which provides communications and navigation relay between lunar outposts (via Lunar Communications Terminals (LCT)) or Sortie parties (with user radios) and large ground antennas on Earth. The LRS consists of a spacecraft containing all the communications and avionics equipment designed by NASA Jet Propulsion Laboratory s (JPL) Team X to perform the relay between lunar-based assets and the Earth. The satellite design is a standard box truss spacecraft design with a thermal control system, 1.7 m solar arrays for 1 kWe power, a 1 m diameter Ka/S band dish which provides relay communications with the LCT, and a Q-band dish for communications to/from the Earth based assets. While JPL's Team X and Goddard Space Flight Center s (GSFC) I M Design Center (IMDC) have completed two other LRS designs, this NASA Glenn Research Center (GRC) COMPASS LRS design sits between them in terms of physical size and capabilities.

  4. A fuzzy-set approach to fault-type identification in digital relaying

    SciTech Connect

    Ferrero, A.; Sangiovanni, S.; Zappitelli, E.

    1994-12-31

    Sometime the operations that a relay is required to perform cannot be easily described in a deterministic way. A significant example of this situation is given by the operations a line really must perform in order to detect the type of fault (line-to-ground, line-to-line, line-to-line involving ground). Recently, the mathematical theory of fuzzy sets featured many practical applications, mainly in industrial controls, and fuzzy-set processors are available to allow real time applications. This paper shows that a fuzzy-set approach can be useful even in digital relaying, whenever ``fuzzy`` decisions have to be undertaken. A possible application to the detection of the type of fault when symmetrical component relaying techniques are adopted is proposed and the results of simulation tests are given.

  5. Bacteriophage as models for virus removal from Pacific oysters (Crassostrea gigas) during re-laying.

    PubMed Central

    Humphrey, T. J.; Martin, K.

    1993-01-01

    A study was undertaken to examine the feasibility of using naturally-occurring bacteriophages to assess the impact of re-laying on levels of viral contamination in Crassostrea gigas, the Pacific oyster. Two phages were chosen. One, male-specific (F+), was enumerated using Salmonella typhimurium. The other, a somatic phage, was detected using an, as yet, uncharacterized Escherichia coli. Investigations, using a variety of re-laying sites, demonstrated that numbers of F+ phage in oyster tissue declined more rapidly than those of somatic phage. For example, in oysters placed in commercially-used sea water ponds, F+ phage reached undetectable levels within 2-3 weeks, whereas somatic phage could still be detected 5 weeks after re-laying. The studies suggest that F+ phage may not be a suitable indicator for virus removal and that somatic phage may be better suited to this role. PMID:8405159

  6. Optical deep space communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Gagliardi, R. M.; Vilnrotter, V. A.; Dolinar, S. J., Jr.

    1981-01-01

    The possible use of an optical for high rate data transmission from a deep space vehicle to an Earth-orbiting relay satellite while RF links are envisioned for the relay to Earth link was studied. A preliminary link analysis is presented for initial sizing of optical components and power levels, in terms of achievable data rates and feasible range distances. Modulation formats are restricted to pulsed laser operation, involving bot coded and uncoded schemes. The advantage of an optical link over present RF deep space link capabilities is shown. The problems of acquisition, pointing and tracking with narrow optical beams are presented and discussed. Mathematical models of beam trackers are derived, aiding in the design of such systems for minimizing beam pointing errors. The expected orbital geometry between spacecraft and relay satellite, and its impact on beam pointing dynamics are discussed.

  7. Multiantenna Relay Beamforming Design for QoS Discrimination in Two-Way Relay Networks

    PubMed Central

    Xiong, Ke; Zhang, Yu; Li, Dandan; Zhong, Zhangdui

    2013-01-01

    This paper investigates the relay beamforming design for quality of service (QoS) discrimination in two-way relay networks. The purpose is to keep legitimate two-way relay users exchange their information via a helping multiantenna relay with QoS guarantee while avoiding the exchanged information overhearing by unauthorized receiver. To this end, we propose a physical layer method, where the relay beamforming is jointly designed with artificial noise (AN) which is used to interfere in the unauthorized user's reception. We formulate the joint beamforming and AN (BFA) design into an optimization problem such that the received signal-to-interference-ratio (SINR) at the two legitimate users is over a predefined QoS threshold while limiting the received SINR at the unauthorized user which is under a certain secure threshold. The objective of the optimization problem is to seek the optimal AN and beamforming vectors to minimize the total power consumed by the relay node. Since the optimization problem is nonconvex, we solve it by using semidefinite program (SDP) relaxation. For comparison, we also study the optimal relay beamforming without using AN (BFO) under the same QoS discrimination constraints. Simulation results show that both the proposed BFA and BFO can achieve the QoS discrimination of the two-way transmission. However, the proposed BFA yields significant power savings and lower infeasible rates compared with the BFO method. PMID:24391459

  8. Tracking and Data Relay Satellite System (TDRSS)

    NASA Technical Reports Server (NTRS)

    Mckenzie, J.; Vanek, C.

    1991-01-01

    The DSN (Deep Space Network) mission support requirements for the Tracking and Data Relay Satellite System (TDRSS) are summarized. The TDRSS consists of four identical satellites in geosynchronous orbits (35,800 km) and a dedicated ground station. The payload of each satellite is a telecommunications service system that relays communication signals between low earth-orbiting user spacecraft and the TDRSS ground terminal. Mission objectives are outlined and the DSN support requirements are defined through the presentation of tables and narratives describing the spacecraft flight profile; DSN support coverage; frequency assignments; support parameters for telemetry, command and support systems; and tracking support responsibility.

  9. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  10. Optimum satellite relay positions with application to a TDRS-1 Indian Ocean relay

    NASA Technical Reports Server (NTRS)

    Jackson, A. H.; Christopher, P.

    1994-01-01

    An Indian Ocean satellite relay is examined. The relay satellite position is optimized by minimizing the sum of downlink and satellite to satellite link losses. Osculating orbital elements are used for fast intensive orbital computation. Integrated Van Vleck gaseous attenuation and a Crane rain model are used for downlink attenuation. Circular polarization losses on the satellite to satellite link are found dynamically. Space to ground link antenna pointing losses are included as a function of yaw ans spacecraft limits. Relay satellite positions between 90 to 100 degrees East are found attractive for further study.

  11. Relay communications strategies for Mars exploration through 2020

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, B.; DePaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2005-01-01

    In this paper we will examine NASA's strategy for relay communications support of missions planned for this decade, and discuss options for longer-term relay network evolution in support of second-decade missions.

  12. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  13. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  14. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  15. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  16. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... § 90.35(b)(3), each mobile relay station, regardless of the frequency or frequencies of the signal by... 47 Telecommunication 5 2011-10-01 2011-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations....

  17. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... § 90.35(b)(3), each mobile relay station, regardless of the frequency or frequencies of the signal by... 47 Telecommunication 5 2014-10-01 2014-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations....

  18. Double-layer video transmission over decode-and-forward wireless relay networks using hierarchical modulation.

    PubMed

    Nguyen, Tu V; Cosman, Pamela C; Milstein, Laurence B

    2014-04-01

    We consider a wireless relay network with a single source, a single destination, and a multiple relay. The relays are half-duplex and use the decode-and-forward protocol. The transmit source is a layered video bitstream, which can be partitioned into two layers, a base layer (BL) and an enhancement layer (EL), where the BL is more important than the EL in terms of the source distortion. The source broadcasts both layers to the relays and the destination using hierarchical 16-QAM. Each relay detects and transmits successfully decoded layers to the destination using either hierarchical 16-QAM or QPSK. The destination can thus receive multiple signals, each of which can include either only the BL or both the BL and the EL. We derive the optimal linear combining method at the destination, where the uncoded bit error rate is minimized. We also present a suboptimal combining method with a closed-form solution, which performs very close to the optimal. We use the proposed double-layer transmission scheme with our combining methods for transmitting layered video bitstreams. Numerical results show that the double-layer scheme can gain 2-2.5 dB in channel signal-to-noise ratio or 5-7 dB in video peak signal-to-noise ratio, compared with the classical single-layer scheme using conventional modulation. PMID:24808347

  19. Distribution Line Protection Relaying Scheme Based on Complex Number Operation

    NASA Astrophysics Data System (ADS)

    Tsuji, Kouichi

    In Japan, operational principles from the mechanical-type era, such as the directional ground relay (DG) and overcurrent relay (OC), are still used without modification for the protection of distribution lines. We are now facing various problems, such as ground faults with high fault resistance in systems isolated from the ground. A new operational principle to solve the above problems is summarized below. ·A fault is simulated by replacing a branched distribution line with a one-section single distribution line, in which loads are concentrated at its terminals. ·Lines with a one-line to ground fault are detected on the basis of the relationship between the fault-phase voltage E before the fault and the fault current using Ho and Thevenin's theorem. ·Faults are assumed to occur at both terminals in the section. If the signs of the obtained fault reactance Xf at the two terminals are opposite, it is judged that a fault point where Xf = 0 holds exists within the section. As a result of the simulation using the program we developed, it was confirmed that no errors in the detection of the internal and external ground faults with a high fault resistance of 0-30kΩ were observed.

  20. Cable Television Service; Cable Television Relay Service.

    ERIC Educational Resources Information Center

    Federal Register, 1972

    1972-01-01

    The rules and regulations of the Federal Communications Commission (FCC) concerning cable television service and cable relay service are presented along with the comments of the National Cable Television Association, the National Association of Broadcasters, the Association of Maximum Service Telecasters, and a major group of program suppliers.…

  1. First Things First: Internet Relay Chat Openings.

    ERIC Educational Resources Information Center

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  2. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  3. Exact Outage Probability of Cognitive Underlay DF Relay Networks with Best Relay Selection

    NASA Astrophysics Data System (ADS)

    Bao, Vo Nguyen Quoc; Duong, Trung Quang

    In this letter, we address the performance analysis of underlay selective decode-and-forward (DF) relay networks in Rayleigh fading channels with non-necessarily identical fading parameters. In particular, a novel result on the outage probability of the considered system is presented. Monte Carlo simulations are performed to verify the correctness of our exact closed-form expression. Our proposed analysis can be adopted for various underlay spectrum sharing applications of cognitive DF relay networks.

  4. Using a micromachined magnetostatic relay in commutating a DC motor

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor); Lilienthal, Gerald (Inventor)

    2004-01-01

    A DC motor is commutated by rotating a magnetic rotor to induce a magnetic field in at least one magnetostatic relay in the motor. Each relay is activated in response to the magnetic field to deliver power to at least one corresponding winding connected to the relay. In some cases, each relay delivers power first through a corresponding primary winding and then through a corresponding secondary winding to a common node. Specific examples include a four-pole, three-phase motor in which each relay is activated four times during one rotation of the magnetic rotor.

  5. Seismic testing and evaluation of relays past and future

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.

    1990-01-01

    Brookhaven National Laboratory (BNL) is conducting a special study on relays. The primary objective of the first series of relay tests was to study systematically the influence of relay design and input motion on seismic capability. The second test series will address some fundamental questions regarding the relay chatter acceptance criteria in addition to the chatter tolerance behavior of a breaker circuit. The characteristics of each relay model as observed from the single frequency test data of the first test series and an outline of the plans for the second test series are described in this paper. 3 refs., 1 tab.

  6. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  7. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  8. Pericarditis - after heart attack

    MedlinePlus

    Dressler syndrome; Post-MI pericarditis; Post-cardiac injury syndrome; Postcardiotomy pericarditis ... Two types of pericarditis can occur after a heart attack . Early pericarditis: This form most occurs within ...

  9. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  10. Spaceborne centrifugal relays for spacecraft propulsion

    NASA Technical Reports Server (NTRS)

    Ouzidane, Malika

    1991-01-01

    Acceleration using centrifugal relays is a recently discovered method for the acceleration of spaceborne payloads to high velocity at high thrust. Centrifugal relays are moving rotors which progressively accelerate reaction mass to higher velocities. One important engineering problem consists of accurately tracking the position of the projectiles and rotors and guiding each projectile exactly onto the appropriate guide tracks on each rotor. The topics of this research are the system kinematics and dynamics and the computerized guidance system which will allow the projectile to approach each rotor with exact timing with respect to the rotor rotation period and with very small errors in lateral positions. Kinematics studies include analysis of rotor and projectile positions versus time and projectile/rotor interactions. Guidance studies include a detailed description of the tracking mechanism (interrupt of optical beams) and the aiming mechanism (electromagnetic focusing) including the design of electromagnetic deflection coils and the switching circuitry.

  11. Solar concentrator with a toroidal relay module.

    PubMed

    Lin, Jhe-Syuan; Liang, Chao-Wen

    2015-10-01

    III-V multijunction solar cells require solar concentrators with a high concentration ratio to reduce per watt cost and to increase solar energy transforming efficiency. This paper discusses a novel solar concentrator design that features a high concentration ratio, high transfer efficiency, thin profile design, and a high solar acceptance angle. The optical design of the concentrator utilizes a toroidal relay module, which includes both the off-axis relay lens and field lens design in a single concentric toroidal lens shape. The optical design concept of the concentrator is discussed and the simulation results are shown. The given exemplary design has an aspect ratio of 0.24, a high averaged optical concentration ratio 1230×, a maximum efficiency of 76.8%, and the solar acceptance angle of ±0.9°. PMID:26479646

  12. Non-latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A non-latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes a permanent magnet and an electromagnet. The respective sections are arranged in separate locations or cavities in the assembly. The switch has a "normal" position and is selectively switched by an overriding electromagnetic assembly. The switch returns to the "normal" position when the overriding electromagnetic assembly is inactive.

  13. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    In the past decade, an evolving network of Mars relay orbiters has provided telecommunication relay services to the Mars Exploration Rovers, Spirit and Opportunity, and to the Mars Phoenix Lander, enabling high-bandwidth, energy-efficient data transfer and greatly increasing the volume of science data that can be returned from the Martian surface, compared to conventional direct-to-Earth links. The current relay network, consisting of NASA's Odyssey and Mars Reconnaissance Orbiter and augmented by ESA's Mars Express Orbiter, stands ready to support the Mars Science Laboratory, scheduled to arrive at Mars on Aug 6, 2012, with new capabilities enabled by the Electra and Electra-Lite transceivers carried by MRO and MSL, respectively. The MAVEN orbiter, planned for launch in 2013, and the ExoMars/Trace Gas Orbiter, planned for launch in 2016, will replenish the on-orbit relay network as the current orbiter approach their end of life. Currently planned support scenarios for this future relay network include an ESA EDL Demonstrator Module deployed by the 2016 ExoMars/TGO orbiter, and the 2018 NASA/ESA Joint Rover, representing the first step in a multimission Mars Sample Return campaign.

  14. Adjustable electronic load-alarm relay

    DOEpatents

    Mason, Charles H.; Sitton, Roy S.

    1976-01-01

    This invention is an improved electronic alarm relay for monitoring the current drawn by an AC motor or other electrical load. The circuit is designed to measure the load with high accuracy and to have excellent alarm repeatability. Chattering and arcing of the relay contacts are minimal. The operator can adjust the set point easily and can re-set both the high and the low alarm points by means of one simple adjustment. The relay includes means for generating a signal voltage proportional to the motor current. In a preferred form of the invention a first operational amplifier is provided to generate a first constant reference voltage which is higher than a preselected value of the signal voltage. A second operational amplifier is provided to generate a second constant reference voltage which is lower than the aforementioned preselected value of the signal voltage. A circuit comprising a first resistor serially connected to a second resistor is connected across the outputs of the first and second amplifiers, and the junction of the two resistors is connected to the inverting terminal of the second amplifier. Means are provided to compare the aforementioned signal voltage with both the first and second reference voltages and to actuate an alarm if the signal voltage is higher than the first reference voltage or lower than the second reference voltage.

  15. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  16. Relay test program. Series 2 tests: Integral testing of relays and circuit breakers

    SciTech Connect

    Bandyopadhyay, K.K.; Kunkel, C.; Shteyngart, S.

    1994-02-01

    This report presents the results of a relay test program conducted by Brookhaven National Laboratory (BNL) under the sponsorship of the US Nuclear Regulatory Commission (NRC). The program is a continuation of an earlier test program the results of which were published in NUREG/CR-4867. The current program was carried out in two phases: electrical testing and vibration testing. The objective was primarily to focus on the electrical discontinuity or continuity of relays and circuit breaker tripping mechanisms subjected to electrical pulses and vibration loads. The electrical testing was conducted by KEMA-Powertest Company and the vibration testing was performed at Wyle Laboratories, Huntsville, Alabama. This report discusses the test procedures, presents the test data, includes an analysis of the data and provides recommendations regarding reliable relay testing.

  17. A fatal elephant attack.

    PubMed

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. PMID:22085093

  18. Using TACS functions within EMTP to teach protective relaying fundamentals

    SciTech Connect

    Wall, R.W.; Johnson, B.K.

    1997-02-01

    The purpose of this discussion is to provide an educational tool for investigating relaying concepts by modeling digital relays using TACS functions within EMTP in a closed-loop manner. Various elements of digital protection systems are identified and organized to generate an systematic approach to modeling the actual hardware of relay systems. Discussion is limited to conventional relaying systems that monitor the vitality of the 60 Hz voltages and/or currents. TACS functions for transport delay and pulse generators are used to model dynamics associated with analog to digital conversion and sampling systems. DSP algorithms convert a sequence of sampled data into a sequence of values for magnitude and phase components. A simple example of a time overcurrent relay is developed to demonstrate the techniques to implement relay control in EMTP with TACS and illustrates the kinds of phenomena that can be studied using these techniques.

  19. Partial processing satellite relays for frequency-hop antijam communications

    NASA Astrophysics Data System (ADS)

    Sussman, S. M.; Kotiveeriah, P.

    1982-08-01

    Jamming effects on the uplink and downlink are combined to derive the earth station-to-earth station performance. In the linear dehop-rehop transponder (DRT), the retransmitted uplink noise and jamming for various ratios of relay bandwidth to data rate are taken into account, and a new end-to-end SNR relation is obtained. The symbol regenerative processor (SRP) analysis is based on the appropriate combining of uplink and downlink error probabilities to yield the end-to-end error probability. The jammer is assumed to employ either full-band noise or optimum partial band jamming, and several combinations of these two jamming strategies are evaluated. The relationship between uplink and downlink SNR are obtained for specified end-to-end SNR or error probability, and drawn between the DRT and the SRP. The analysis treats M-ary orthogonal frequency shift typing with incoherent combining and detection of multiple frequency hops per symbol.

  20. Automation of servicibility of radio-relay station equipment

    NASA Astrophysics Data System (ADS)

    Uryev, A. G.; Mishkin, Y. I.; Itkis, G. Y.

    1985-03-01

    Automation of the serviceability of radio relay station equipment must ensure central gathering and primary processing of reliable instrument reading with subsequent display on the control panel, detection and recording of failures soon enough, advance enough warning based on analysis of detertioration symptoms, and correct remote measurement of equipment performance parameters. Such an inspection will minimize transmission losses while reducing nonproductive time and labor spent on documentation and measurement. A multichannel automated inspection system for this purpose should operate by a parallel rather than sequential procedure. Digital data processing is more expedient in this case than analog method and, therefore, analog to digital converters are required. Spepcial normal, above limit and below limit test signals provide means of self-inspection, to which must be added adequate interference immunization, stabilization, and standby power supply. Use of a microcomputer permits overall refinement and expansion of the inspection system while it minimizes though not completely eliminates dependence on subjective judgment.

  1. Programming A Molecular Relay for Ultrasensitive Biodetection through 129 Xe NMR

    SciTech Connect

    Wang, Yanfei; Roose, Benjamin W.; Philbin, John P.; Doman, Jordan L.; Dmochowski, Ivan J.

    2015-12-21

    We reported a supramolecular strategy for detecting specific proteins in complex media by using hyperpolarized 129Xe NMR. A cucurbit[6]uril (CB[6])-based molecular relay was programmed for three sequential equilibrium conditions by designing a two-faced guest (TFG) that initially binds CB[6] and blocks the CB[6]–Xe interaction. Moreover, the protein analyte recruits the TFG and frees CB[6] for Xe binding. TFGs containing CB[6]- and carbonic anhydrase II (CAII)-binding domains were synthesized in one or two steps. X-ray crystallography confirmed TFG binding to Zn2+ in the deep CAII active-site cleft, which precludes simultaneous CB[6] binding. The molecular relay was reprogrammed to detect avidin by using a different TFG. Finally, Xe binding by CB[6] was detected in buffer and in E. coli cultures expressing CAII through ultrasensitive 129Xe NMR spectroscopy.

  2. Internet Relaying of Total Solar Eclipse on 11 August,1999

    NASA Astrophysics Data System (ADS)

    Nagai, T.; Takahashi, N.; Okyudo, M.; Suginaka, M.; Matsumoto, N.; Team Of Live! Eclipse

    The total solar eclipse was relayed live through the Internet from Siberia, Russia, on 9 March 1997. Subsequently, the total solar eclipse was relayed from Venezuela and Guadeloupe in the Caribbean Sea in 26 February 1998, the annular solar eclipse from Malaysia on 21 August 1998, and the annular solar eclipse from Australia on 16 February 1999. The Internet was used to relay the total solar eclipse to be seen in Europe, Rumania, Turkey, and Iran. We succeeded in transmitting images from Turkey.

  3. Relay Telecommunications for the Coming Decade of Mars Exploration

    NASA Technical Reports Server (NTRS)

    Edwards, C.; DePaula, R.

    2010-01-01

    Over the past decade, an evolving network of relay-equipped orbiters has advanced our capabilities for Mars exploration. NASA's Mars Global Surveyor, 2001 Mars Odyssey, and Mars Reconnaissance Orbiter (MRO), as well as ESA's Mars Express Orbiter, have provided telecommunications relay services to the 2003 Mars Exploration Rovers, Spirit and Opportunity, and to the 2007 Phoenix Lander. Based on these successes, a roadmap for continued Mars relay services is in place for the coming decade. MRO and Odyssey will provide key relay support to the 2011 Mars Science Laboratory (MSL) mission, including capture of critical event telemetry during entry, descent, and landing, as well as support for command and telemetry during surface operations, utilizing new capabilities of the Electra relay payload on MRO and the Electra-Lite payload on MSL to allow significant increase in data return relative to earlier missions. Over the remainder of the decade a number of additional orbiter and lander missions are planned, representing new orbital relay service providers and new landed relay users. In this paper we will outline this Mars relay roadmap, quantifying relay performance over time, illustrating planned support scenarios, and identifying key challenges and technology infusion opportunities.

  4. Ground wave emergency network final operational capability: Environmental assessment for southern Nevada relay node site number RN 8W918NV

    NASA Astrophysics Data System (ADS)

    1993-03-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  5. Ground wave emergency network final operational capability: Environmental assessment for northwestern Nebraska relay node, site number RN 8C930NE

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in northwestern Nebraska, consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  6. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  7. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    ... to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent The content in this library is for educational purposes only, and therefore is not intended to be a substitute for professional medical advice, diagnosis or treatment.

  8. High-performance inkjet-printed four-terminal microelectromechanical relays and inverters.

    PubMed

    Chung, Seungjun; Ul Karim, Muhammed Ahosan; Kwon, Hyuk-Jun; Subramanian, Vivek

    2015-05-13

    We report the first demonstration of inkjet-printed 4-terminal microelectromechanical (MEM) relays and inverters with hyper-abrupt switching that exhibit excellent electrical and mechanical characteristics. This first implementation of a printed 4-terminal device is critically important, since it allows for the realization of full complementary logic functions. The floated fourth terminal (body electrode), which allows the gate switching voltage to be adjusted, is bonded to movable channel beams via a printed epoxy layer in a planar structure, which can move downward together via the electrostatic force between the gate electrodes and body such that the channel can also actuate downward and touch the drain electrode. Because the body, channel, and drain electrodes are completely electrically separated, no detectable leakage or electrical interference between the electrodes is observed. The printed MEM relay exhibited an on-state resistance of only 3.48 Ω, immeasurable off-state leakage, subthreshold swing <1 mV/dec, and a stable operation over 10(4) cycles with a switching delay of 47 μs, and the relay inverter exhibits abrupt transitions between on/off states. The operation of the printed 4-terminal MEM relay was also verified against the results of a 3-dimensional (3D) finite element simulation. PMID:25830693

  9. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  10. Galileo probe relay receiver - Acquisition and tracking

    NASA Technical Reports Server (NTRS)

    Von Der Embse, U. A.

    1983-01-01

    The probe-to-orbiter data link for the Jovian mission uses a Manchester encoded BPSK waveform which is demodulated by the Galileo probe relay receiver. Signal acquisition and tracking consists of a sequential probability ratio signal search, frequency acquisition with a least-squares estimator, wide-band phase lock acquisition, and a self-regulating mode control. A discrete Fourier transform serves as the basic mechanism to generate the algorithms that provide this orderly transition to phase tracking. Acquisition and tracking is addressed in this paper with emphasis on key algorithms, rationale, and theoretical/measured performance.

  11. Relay testing at Brookhaven National Laboratory

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.

    1989-01-01

    Brookhaven National Laboratory (BNL) is conducting a seismic test program on relays. The purpose of the test program is to investigate the influence of various designs, electrical and vibration parameters on the seismic capacity levels. The first series of testing has been completed and performed at Wyle Laboratories. The major part of the test program consisted of single axis, single frequency sine dwell tests. Random multiaxis, multifrequency tests were also performed. Highlights of the test results as well as a description of the testing methods are presented in this paper. 10 figs.

  12. Neural network classifier of attacks in IP telephony

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  13. Detecting Sirex noctilio grey-attacked and lightning-struck pine trees using airborne hyperspectral data, random forest and support vector machines classifiers

    NASA Astrophysics Data System (ADS)

    Abdel-Rahman, Elfatih M.; Mutanga, Onisimo; Adam, Elhadi; Ismail, Riyad

    2014-02-01

    The visual progression of sirex (Sirex noctilio) infestation symptoms has been categorized into three distinct infestation phases, namely the green, red and grey stages. The grey stage is the final stage which leads to almost complete defoliation resulting in dead standing trees or snags. Dead standing pine trees however, could also be due to the lightning damage. Hence, the objective of the present study was to distinguish amongst healthy, sirex grey-attacked and lightning-damaged pine trees using AISA Eagle hyperspectral data, random forest (RF) and support vector machines (SVM) classifiers. Our study also presents an opportunity to look at the possibility of separating amongst the previously mentioned pine trees damage classes and other landscape classes on the study area. The results of the present study revealed the robustness of the two machine learning classifiers with an overall accuracy of 74.50% (total disagreement = 26%) for RF and 73.50% (total disagreement = 27%) for SVM using all the remaining AISA Eagle spectral bands after removing the noisy ones. When the most useful spectral bands as measured by RF were exploited, the overall accuracy was considerably improved; 78% (total disagreement = 22%) for RF and 76.50% (total disagreement = 24%) for SVM. There was no significant difference between the performances of the two classifiers as demonstrated by the results of McNemar's test (chi-squared; χ2 = 0.14, and 0.03 when all the remaining ASIA Eagle wavebands, after removing the noisy ones and the most important wavebands were used, respectively). This study concludes that AISA Eagle data classified using RF and SVM algorithms provide relatively accurate information that is important to the forest industry for making informed decision regarding pine plantations health protocols.

  14. A Geosynchronous Orbit Optical Communications Relay Architecture

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2014-01-01

    NASA is planning to fly a Next Generation Tracking and Data Relay Satellite (TDRS) next decade. While the requirements and architecture for that satellite are unknown at this time, NASA is investing in communications technologies that could be deployed on the satellite to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in December 2017 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the Next Generation TDRS. While it is obvious that a small to medium sized optical communications terminal could be flown on a GEO satellite to provide support to Near Earth missions, it is also possible to deploy a large terminal on the satellite to support Deep Space missions. Onboard data processing and Delay Tolerant Networking (DTN) are two additional technologies that could be used to optimize optical communications link services and enable additional mission and network operations. This paper provides a possible architecture for the optical communications augmentation of a Next Generation TDRS and touches on the critical technology work currently being done at NASA. It will also describe the impact of clouds on such an architecture and possible mitigation techniques.

  15. The data-relay preparatory programme

    NASA Astrophysics Data System (ADS)

    Dickinson, A.

    1990-02-01

    The data-relay preparatory program establishes and defines the preferred configuration for the data-relay system (DRS) space and ground segments, information-transmission, telemetry, telecommand and ranging sevices for foreseen European space programs, including Columbus, Ariane-5, Hermes and advanced earth-observation systems. This program has been conducted in two main areas: system studies and technological development. The system study has been divided in three main phases: (1) system design, i.e., configuration of the ground and spaceborne elements (1988); (2) definition of configuration and capacity of DRS satellites (1989); and (3) design of satellites and ground-segment facilities on the subsystem level (1990). As a result of the study, the DRS configuration will provide two operational satellites in geostationary orbit with orbital position of 44 deg W and 59 deg E which will allow almost full global coverage. The European DRS will be served by independent user earth terminals, with mission control center (MCC) in Darmstadt. The first system is planned to be fully operational in 1996.

  16. An economically viable space power relay system

    NASA Astrophysics Data System (ADS)

    Bekey, Ivan; Boudreault, Richard

    1999-09-01

    This paper describes and analyzes the economics of a power relay system that takes advantage of recent technological advances to implement a system that is economically viable. A series of power relay systems are described and analyzed which transport power ranging from 1,250 megawatts to 5,000 megawatts, and distribute it to receiving sites at transcontinental distances. Two classes of systems are discussed—those with a single reflector and delivering all the power to a single rectenna, and a second type which has multiple reflectors and distributes it to 10 rectenna sites, sharing power among them. It is shown that when offering electricity at prices competitive to those prevalent in developed cities in the US that a low IRR is inevitable, and economic feasibility of a business is unlikely. However, when the target market is Japan where the prevalent electricity prices are much greater, that an IRR exceeding 65% is readily attainable. This is extremely attractive to potential investors, making capitalization of a venture likely. The paper shows that the capital investment required for the system can be less than 1 per installed watt, contributing less than 0.02 /KW-hr to the cost of energy provision. Since selling prices in feasible regions range from 0.18 to over 030 $/kW-hr, these costs are but a small fraction of the operating expenses. Thus a very large IRR is possible for such a business.

  17. Facial dog attack injuries.

    PubMed

    Lin, Wei; Patil, Pavan Manohar

    2015-02-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to successful management of such wounds are meticulous cleansing of the wound, careful debridement, primary repair, appropriate antibiotic therapy, and rabies and tetanus immunization where indicated. This review presents an overview of the epidemiology, presentation, management of such emergencies, and the recent advances in the care of such patients. PMID:25829713

  18. Understanding the Design, Function and Testing of Relays

    ERIC Educational Resources Information Center

    Adams, Roger E.; Lindbloom, Trent

    2006-01-01

    The increased use of electronics in today's automobiles has complicated the control of circuits and actuators. Manufacturers use relays to control a variety of complex circuits--for example, those involving actuators and other components like the A/C clutch, electronic cooling fans, and blower motors. Relays allow a switch or processor to control…

  19. MaROS Strategic Relay Planning and Coordination Interfaces

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    The Mars Relay Operations Service (MaROS) is designed to provide planning and analysis tools in support of ongoing Mars Network relay operations. Strategic relay planning requires coordination between lander and orbiter mission ground data system (GDS) teams to schedule and execute relay communications passes. MaROS centralizes this process, correlating all data relevant to relay coordination to provide a cohesive picture of the relay state. Service users interact with the system through thin-layer command line and web user interface client applications. Users provide and utilize data such as lander view periods of orbiters, Deep Space Network (DSN) antenna tracks, and reports of relay pass performance. Users upload and download relevant relay data via formally defined and documented file structures including some described in Extensible Markup Language (XML). Clients interface with the system via an http-based Representational State Transfer (ReST) pattern using Javascript Object Notation (JSON) formats. This paper will provide a general overview of the service architecture and detail the software interfaces and considerations for interface design.

  20. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front...

  1. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front...

  2. Implementation of a Relay Coordination System for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    Mars network relay operations involve the coordination of lander and orbiter teams through long-term and short-term planning, tactical changes and post-pass analysis. Much of this coordination is managed through email traffic and point-to-point file data exchanges. It is often difficult to construct a complete and accurate picture of the relay situation at any given moment, as there is no centralized store of correlated relay data. The Mars Relay Operations Service (MaROS) is being implemented to address the problem of relay coordination for current and next-generation relay missions. The service is provided for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These "relay" sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This paper will discuss the relay coordination problem space, overview the architecture and design selected to meet system requirements, and describe the first phase of system implementation

  3. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS...

  4. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS...

  5. Relay studies: Existing data, current testing and cabinet amplification

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.; Kassir, M.; Pepper, S.

    1988-01-01

    The seismic fragility of most electrical equipment is governed by the malfunction of relays. This paper discusses the combined study being performed at BNL by evaluating existing fragility test data, conducting a new relay test program and estimating the cabinet amplification at relay locations. Existing test data for relays have been collected and evaluated at BNL. The data base consists of results from a wide variety of test programs - single frequency, single axis, multifrequency, multiaxis tests. For most relays, the non-operating condition controls the chatter fragility limit. In order to characterize the effect of various parameters on the relay seismic capacity, a test program has been initiated at BNL. Selected test specimens will be tested to determine the influence of frequency of vibration, direction of motion, adjustments of relay parts, among others, on the relay capacities. The amplification study involves computing dynamic amplification factors at various device locations in motor control centers and switchgear cabinets. Fragility and high level qualification data have been used for this purpose. This paper includes a summary of the amplification results. 4 refs., 6 figs., 1 tab.

  6. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  7. Effects of relay chatter in seismic probabilistic safety analysis

    SciTech Connect

    Reed, J.W.; Shiu, K.K.

    1985-01-01

    In the Zion and Indian Point Probabilistic Safety Studies, relay chatter was dismissed as a credible event and hence was not formally included in the analyses. Although little discussion is given in the Zion and Indian Point PSA documentation concerning the basis for this decision, it has been expressed informally that it was assumed that the operators will be able to reset all relays in a timely manner. Currently, it is the opinion of many professionals that this may be an oversimplification. The three basic areas which must be considered in addressing relay chatter include the fragility of the relays per se, the reliability of the operators to reset the relays and finally the systems response aspects. Each of these areas is reviewed and the implications for seismic PSA are discussed. Finally, recommendations for future research are given.

  8. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  9. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  10. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  11. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  12. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  13. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  14. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  15. A European advanced data relay system

    NASA Astrophysics Data System (ADS)

    de Agostini, Agostino; Puccio, Antonio; Zanotti, Glullo

    1990-10-01

    The purpose of the study is to select the most attractive configuration(s) for an advanced data relay system to be employed at the beginning of the next century. A users scenario with such user classes as a manned in-orbit infrastructure and related support, launchers/transit vehicles, earth observation spacecraft, automatic microgravity free flyers, and scientific spacecraft is considered. System architecture is discussed in terms of configuration analysis and resources definition. The analysis of the space segment contains the definition of link requirements and payloads, as well as mass/power budget and accommodations on space platforms, and the ground segment is assessed from the system-facility and user earth-terminal points of view. Cost analysis and trade-offs are presented, and the key parameters such as the zone of exclusion, service availability, service continuity, intersatellite link implementation, feeder link, platform configuration, ground infrastructure, and economic viability are considered.

  16. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  17. Satellite data-relay activities in Arizona

    USGS Publications Warehouse

    Boner, F.C.; Blee, J.W.; Shope, W.G.

    1985-01-01

    The U.S. Geological Survey (USGS) Arizona District collects data from automated streamflow stations for a wide variety of uses. Data from these stations are provided to Federal, State, and local agencies that have a responsibility to issue flood warnings; to generate forecasts of water availability; to monitor flow to insure compliance with treaties and other legal mandates; and to manage reservoirs for hydropower, flood abatement, and municipal and irrigation water supply. In the mid-1970's, the escalation of data collection costs and a need for more timely data led the Arizona District to examine alternatives for remote data acquisition. On the basis of successful data communications experiments with NASA 's Landsat satellite, an operational system for satellite-data relay was developed in 1976 using the National Oceanic and Atmospheric Administrations 's (NOAA) Geostationary Operational Environmental Satellite (GOES). A total of 62 data collection platforms (DCP's) was operated in 1983. Satellite telemetry operations are controlled at the remote data-collection stations by small battery-operated data collection platforms. The DCP 's periodically collect data from the sensors, store the data in computer memory, and at preset times transmit the data to the GOES satellite. The satellite retransmits the data to Earth where a ground-receive station transmits or transfers the data by land communications to the USGS computer in Reston, Virginia, for processing. The satellite relay transfers the data from sensor to computer in minutes; therefore, the data are available to users on a near real-time basis. (Author 's abstract)

  18. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  19. Relay Support for the Mars Science Laboratory Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D. Jr,; Bell, David J.; Gladden, Roy E.; Ilott, Peter A.; Jedrey, Thomas C.; Johnston, M. Daniel; Maxwell, Jennifer L.; Mendoza, Ricardo; McSmith, Gaylon W.; Potts, Christopher L.; Schratz, Brian C.; Shihabi, Mazen M.; Srinivasan, Jeffrey M.; Varghese, Phillip; Sanders, Stephen S.; Denis, Michel

    2013-01-01

    The Mars Science Laboratory (MSL) mission landed the Curiosity Rover on the surface of Mars on August 6, 2012, beginning a one-Martian-year primary science mission. An international network of Mars relay orbiters, including NASA's 2001 Mars Odyssey Orbiter (ODY) and Mars Reconnaissance Orbiter (MRO), and ESA's Mars Express Orbiter (MEX), were positioned to provide critical event coverage of MSL's Entry, Descent, and Landing (EDL). The EDL communication plan took advantage of unique and complementary capabilities of each orbiter to provide robust information capture during this critical event while also providing low-latency information during the landing. Once on the surface, ODY and MRO have provided effectively all of Curiosity's data return from the Martian surface. The link from Curiosity to MRO incorporates a number of new features enabled by the Electra and Electra-Lite software-defined radios on MRO and Curiosity, respectively. Specifically, the Curiosity-MRO link has for the first time on Mars relay links utilized frequency-agile operations, data rates up to 2.048 Mb/s, suppressed carrier modulation, and a new Adaptive Data Rate algorithm in which the return link data rate is optimally varied throughout the relay pass based on the actual observed link channel characteristics. In addition to the baseline surface relay support by ODY and MRO, the MEX relay service has been verified in several successful surface relay passes, and MEX now stands ready to provide backup relay support should NASA's orbiters become unavailable for some period of time.

  20. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  1. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  2. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  3. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  4. 130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  5. 129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  6. 18. VIEW OF URBAN DISPATCH RELAY ROOM, FIRST FLOOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. VIEW OF URBAN DISPATCH - RELAY ROOM, FIRST FLOOR (THIS IS THE CONTROL CENTER FOR TRACK SWITCHES) - Pennsylvania Railroad, Harrisburg Station & Trainshed, Market & South Fourth Streets, Harrisburg, Dauphin County, PA

  7. Reliable quantum communication over a quantum relay channel

    SciTech Connect

    Gyongyosi, Laszlo; Imre, Sandor

    2014-12-04

    We show that reliable quantum communication over an unreliable quantum relay channels is possible. The coding scheme combines the results on the superadditivity of quantum channels and the efficient quantum coding approaches.

  8. 34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER P.H. #3, JUNE 23, 1943. SCE drawing no. 413187-1. - Santa Ana River Hydroelectric System, SAR-3 Powerhouse, San Bernardino National Forest, Redlands, San Bernardino County, CA

  9. 15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  10. 14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT