Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing
2017-01-01
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.
VMSoar: a cognitive agent for network security
NASA Astrophysics Data System (ADS)
Benjamin, David P.; Shankar-Iyer, Ranjita; Perumal, Archana
2005-03-01
VMSoar is a cognitive network security agent designed for both network configuration and long-term security management. It performs automatic vulnerability assessments by exploring a configuration"s weaknesses and also performs network intrusion detection. VMSoar is built on the Soar cognitive architecture, and benefits from the general cognitive abilities of Soar, including learning from experience, the ability to solve a wide range of complex problems, and use of natural language to interact with humans. The approach used by VMSoar is very different from that taken by other vulnerability assessment or intrusion detection systems. VMSoar performs vulnerability assessments by using VMWare to create a virtual copy of the target machine then attacking the simulated machine with a wide assortment of exploits. VMSoar uses this same ability to perform intrusion detection. When trying to understand a sequence of network packets, VMSoar uses VMWare to make a virtual copy of the local portion of the network and then attempts to generate the observed packets on the simulated network by performing various exploits. This approach is initially slow, but VMSoar"s learning ability significantly speeds up both vulnerability assessment and intrusion detection. This paper describes the design and implementation of VMSoar, and initial experiments with Windows NT and XP.
Risk assessment by dynamic representation of vulnerability, exploitation, and impact
NASA Astrophysics Data System (ADS)
Cam, Hasan
2015-05-01
Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.
Statistics of software vulnerability detection in certification testing
NASA Astrophysics Data System (ADS)
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.
Multiple perspective vulnerability analysis of the power network
NASA Astrophysics Data System (ADS)
Wang, Shuliang; Zhang, Jianhua; Duan, Na
2018-02-01
To understand the vulnerability of the power network from multiple perspectives, multi-angle and multi-dimensional vulnerability analysis as well as community based vulnerability analysis are proposed in this paper. Taking into account of central China power grid as an example, correlation analysis of different vulnerability models is discussed. Then, vulnerabilities produced by different vulnerability metrics under the given vulnerability models and failure scenarios are analyzed. At last, applying the community detecting approach, critical areas of central China power grid are identified, Vulnerable and robust communities on both topological and functional perspective are acquired and analyzed. The approach introduced in this paper can be used to help decision makers develop optimal protection strategies. It will be also useful to give a multiple vulnerability analysis of the other infrastructure systems.
Topological Analysis of Wireless Networks (TAWN)
2016-05-31
transmissions from any other node. Definition 1. A wireless network vulnerability is its susceptibility to becoming disconnected when a single source of...19b. TELEPHONE NUMBER (Include area code) 31-05-2016 FINAL REPORT 12-02-2015 -- 31-05-2016 Topological Analysis of Wireless Networks (TAWN) Robinson...Release, Distribution Unlimited) N/A The goal of this project was to develop topological methods to detect and localize vulnerabilities of wireless
Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...
Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics
2012-05-22
cyber at- tack. Recently, high -prole successful attacks have been detected against the International Mon- etary Fund, Citibank, Lockheed Martin, Google...RSA Security, Sony, and Oak Ridge National Laboratory[13]. These and other attacks have heightened securing networks as a high priority for many...of high -severity vulnerabilities found by network vulnerability scanners (e.g., [40]) and the numbers or percentages of hosts that are are not
Identifying and tracking attacks on networks: C3I displays and related technologies
NASA Astrophysics Data System (ADS)
Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.
2003-09-01
Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
Aquatic invasive species early detection in the Great Lakes: Lessons concerning strategy
Great Lakes coastal systems are vulnerable to introduction of a wide variety of non-indigenous species (NIS), and the desire to effectively respond to future invaders is prompting efforts towards establishing a broad early-detection network. Such a network requires statistically...
Sarafijanović, Slavisa; Le Boudec, Jean-Yves
2005-09-01
In mobile ad hoc networks, nodes act both as terminals and information relays, and they participate in a common routing protocol, such as dynamic source routing (DSR). The network is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems aim at removing this vulnerability. In this paper, we investigate the use of an artificial immune system (AIS) to detect node misbehavior in a mobile ad hoc network using DSR. The system is inspired by the natural immune system (IS) of vertebrates. Our goal is to build a system that, like its natural counterpart, automatically learns, and detects new misbehavior. We describe our solution for the classification task of the AIS; it employs negative selection and clonal selection, the algorithms for learning and adaptation used by the natural IS. We define how we map the natural IS concepts such as self, antigen, and antibody to a mobile ad hoc network and give the resulting algorithm for classifying nodes as misbehaving. We implemented the system in the network simulator Glomosim; we present detection results and discuss how the system parameters affect the performance of primary and secondary response. Further steps will extend the design by using an analogy to the innate system, danger signal, and memory cells.
Change Detection Algorithms for Information Assurance of Computer Networks
2002-01-01
original document contains color images. 14. ABSTRACT see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...number of computer attacks increases steadily per year. At the time of this writing the Internet Security Systems’ baseline assessment is that a new...across a network by exploiting security flaws in widely-used services offered by vulnerable computers. In order to locate the vulnerable computers, the
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Şen, Sevil; Clark, John A.; Tapiador, Juan E.
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion detection systems (IDS) are ineffective and inefficient for highly dynamic and resource-constrained environments. Achieving an effective operational MANET requires tradeoffs to be made between functional and non-functional criteria. In this paper we show how Genetic Programming (GP) together with a Multi-Objective Evolutionary Algorithm (MOEA) can be used to synthesise intrusion detection programs that make optimal tradeoffs between security criteria and the power they consume.
Anomaly Detection Techniques for Ad Hoc Networks
ERIC Educational Resources Information Center
Cai, Chaoli
2009-01-01
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
The study and implementation of the wireless network data security model
NASA Astrophysics Data System (ADS)
Lin, Haifeng
2013-03-01
In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.
ESB-based Sensor Web integration for the prediction of electric power supply system vulnerability.
Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja
2013-08-15
Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.
ESB-Based Sensor Web Integration for the Prediction of Electric Power Supply System Vulnerability
Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja
2013-01-01
Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application. PMID:23955435
SSL/TLS Vulnerability Detection Using Black Box Approach
NASA Astrophysics Data System (ADS)
Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.
2018-03-01
Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.
On effectiveness of network sensor-based defense framework
NASA Astrophysics Data System (ADS)
Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh
2012-06-01
Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Purvine, Emilie AH; Johnson, John R.; Lo, Chaomei
Most cyber network attacks begin with an adversary gain- ing a foothold within the network and proceed with lateral movement until a desired goal is achieved. The mechanism by which lateral movement occurs varies but the basic signa- ture of hopping between hosts by exploiting vulnerabilities is the same. Because of the nature of the vulnerabilities typ- ically exploited, lateral movement is very difficult to detect and defend against. In this paper we define a dynamic reach- ability graph model of the network to discover possible paths that an adversary could take using different vulnerabilities, and how those paths evolvemore » over time. We use this reacha- bility graph to develop dynamic machine-level and network- level impact scores. Lateral movement mitigation strategies which make use of our impact scores are also discussed, and we detail an example using a freely available data set.« less
2010-03-01
Employ NetFlow on Edge Router ......................................... 45 E. IMPLEMENT AN INTEGRATED VULNERABILITY ASSESSMENT. 48 1. Conduct...45 Figure 18. Netflow Information on Unauthorized Connections ............................ 46 Figure 19. Algorithm for Detecting...indicating that an attack has being initiated from this port. Figure 17. Information on Traffic Generated by Suspicious Host 3. Employ NetFlow
Topological Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Jajodia, Sushil; Noel, Steven
Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network. From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security. TVA finds potential paths of vulnerability through a network, showing exactly how attackers may penetrate a network. From this, we identify key vulnerabilities and provide strategies for protection of critical network assets.
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
NASA Astrophysics Data System (ADS)
Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka
Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.
Evaluating Machine Learning Classifiers for Hybrid Network Intrusion Detection Systems
2015-03-26
7 VRT Vulnerability Research Team...and the Talos (formerly the Vulnerability Research Team ( VRT )) [7] 7 ruleset libraries are the two leading rulesets in use. Both libraries offer paid...rule sets to load for the signature-based IDS. Snort is selected as the IDS engine using the “ VRT and ET No/GPL” rule set. The total rule count in the
Comparison analysis on vulnerability of metro networks based on complex network
NASA Astrophysics Data System (ADS)
Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan
2018-04-01
This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.
Vulnerability of complex networks
NASA Astrophysics Data System (ADS)
Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco
2011-01-01
We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.
Multilayer Statistical Intrusion Detection in Wireless Networks
NASA Astrophysics Data System (ADS)
Hamdi, Mohamed; Meddeb-Makhlouf, Amel; Boudriga, Noureddine
2008-12-01
The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This paper proposes a multilayer statistical intrusion detection framework for wireless networks. The architecture is adequate to wireless networks because the underlying detection models rely on radio parameters and traffic models. Accurate correlation between radio and traffic anomalies allows enhancing the efficiency of the IDS. A radio signal fingerprinting technique based on the maximal overlap discrete wavelet transform (MODWT) is developed. Moreover, a geometric clustering algorithm is presented. Depending on the characteristics of the fingerprinting technique, the clustering algorithm permits to control the false positive and false negative rates. Finally, simulation experiments have been carried out to validate the proposed IDS.
Cyber situational awareness and differential hardening
NASA Astrophysics Data System (ADS)
Dwivedi, Anurag; Tebben, Dan
2012-06-01
The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.
A robust trust establishment scheme for wireless sensor networks.
Ishmanov, Farruh; Kim, Sung Won; Nam, Seung Yeob
2015-03-23
Security techniques like cryptography and authentication can fail to protect a network once a node is compromised. Hence, trust establishment continuously monitors and evaluates node behavior to detect malicious and compromised nodes. However, just like other security schemes, trust establishment is also vulnerable to attack. Moreover, malicious nodes might misbehave intelligently to trick trust establishment schemes. Unfortunately, attack-resistance and robustness issues with trust establishment schemes have not received much attention from the research community. Considering the vulnerability of trust establishment to different attacks and the unique features of sensor nodes in wireless sensor networks, we propose a lightweight and robust trust establishment scheme. The proposed trust scheme is lightweight thanks to a simple trust estimation method. The comprehensiveness and flexibility of the proposed trust estimation scheme make it robust against different types of attack and misbehavior. Performance evaluation under different types of misbehavior and on-off attacks shows that the detection rate of the proposed trust mechanism is higher and more stable compared to other trust mechanisms.
An adaptive neural swarm approach for intrusion defense in ad hoc networks
NASA Astrophysics Data System (ADS)
Cannady, James
2011-06-01
Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.
Sequential defense against random and intentional attacks in complex networks.
Chen, Pin-Yu; Cheng, Shin-Ming
2015-02-01
Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.
Construction of road network vulnerability evaluation index based on general travel cost
NASA Astrophysics Data System (ADS)
Leng, Jun-qiang; Zhai, Jing; Li, Qian-wen; Zhao, Lin
2018-03-01
With the development of China's economy and the continuous improvement of her urban road network, the vulnerability of the urban road network has attracted increasing attention. Based on general travel cost, this work constructs the vulnerability evaluation index for the urban road network, and evaluates the vulnerability of the urban road network from the perspective of user generalised travel cost. Firstly, the generalised travel cost model is constructed based on vehicle cost, travel time, and traveller comfort. Then, the network efficiency index is selected as an evaluation index of vulnerability: the network efficiency index is composed of the traffic volume and the generalised travel cost, which are obtained from the equilibrium state of the network. In addition, the research analyses the influence of traffic capacity decrease, road section attribute value, and location of road section, on vulnerability. Finally, the vulnerability index is used to analyse the local area network of Harbin and verify its applicability.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-12
...) Not to exceed 3000 positions that require unique cyber security skills and knowledge to perform cyber..., distributed control systems security, cyber incident response, cyber exercise facilitation and management, cyber vulnerability detection and assessment, network and systems engineering, enterprise architecture...
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923
A user exposure based approach for non-structural road network vulnerability analysis
Jin, Lei; Wang, Haizhong; Yu, Le; Liu, Lin
2017-01-01
Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i) the rationality of non-structural road network vulnerability, (ii) the metrics for negative consequences accounting for variant road conditions, and (iii) the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for “emotionally hurt” of topological road network. PMID:29176832
Sensor Anomaly Detection in Wireless Sensor Networks for Healthcare
Haque, Shah Ahsanul; Rahman, Mustafizur; Aziz, Syed Mahfuzul
2015-01-01
Wireless Sensor Networks (WSN) are vulnerable to various sensor faults and faulty measurements. This vulnerability hinders efficient and timely response in various WSN applications, such as healthcare. For example, faulty measurements can create false alarms which may require unnecessary intervention from healthcare personnel. Therefore, an approach to differentiate between real medical conditions and false alarms will improve remote patient monitoring systems and quality of healthcare service afforded by WSN. In this paper, a novel approach is proposed to detect sensor anomaly by analyzing collected physiological data from medical sensors. The objective of this method is to effectively distinguish false alarms from true alarms. It predicts a sensor value from historic values and compares it with the actual sensed value for a particular instance. The difference is compared against a threshold value, which is dynamically adjusted, to ascertain whether the sensor value is anomalous. The proposed approach has been applied to real healthcare datasets and compared with existing approaches. Experimental results demonstrate the effectiveness of the proposed system, providing high Detection Rate (DR) and low False Positive Rate (FPR). PMID:25884786
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
Distributed clone detection in static wireless sensor networks: random walk with network division.
Khan, Wazir Zada; Aalsalem, Mohammed Y; Saad, N M
2015-01-01
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads.
Vulnerability of networks of interacting Markov chains.
Kocarev, L; Zlatanov, N; Trajanov, D
2010-05-13
The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.
Wireless Local Area Network (WLAN) Vulnerability Assessment and Security
2005-09-01
even that they have a Bluetooth device to begin with. Bluetooth attacks can permit network sniffing, device detection, data and services theft . Two...the Bluetooth v1.1 Foundation Specifications9. One major security issue is the fact that the Bluetooth standard allows a single device to communicate...simultaneously with multiple other devices . Many Bluetooth radios are embedded in devices and users often do not realize whether they are on or
Sleep Deprivation Attack Detection in Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata
2012-02-01
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.
Combining demographic and genetic factors to assess population vulnerability in stream species
Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon
2014-01-01
Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss of genetic diversity and reduced numbers in certain vulnerable populations. This demogenetic simulation framework, which is illustrated in a web-based interactive mapping prototype, should be useful for evaluating population vulnerability in a wide variety of dendritic and fragmented riverscapes, helping to guide conservation and management efforts for freshwater species.
Why do vulnerability cycles matter in financial networks?
NASA Astrophysics Data System (ADS)
Silva, Thiago Christiano; Tabak, Benjamin Miranda; Guerra, Solange Maria
2017-04-01
We compare two widely employed models that estimate systemic risk: DebtRank and Differential DebtRank. We show that not only network cyclicality but also the average vulnerability of banks are essential concepts that contribute to widening the gap in the systemic risk estimates of both approaches. We find that systemic risk estimates are the same whenever the network has no cycles. However, in case the network presents cyclicality, then we need to inspect the average vulnerability of banks to estimate the underestimation gap. We find that the gap is small regardless of the cyclicality of the network when its average vulnerability is large. In contrast, the observed gap follows a quadratic behavior when the average vulnerability is small or intermediate. We show results using an econometric exercise and draw guidelines both on artificial and real-world financial networks.
Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.
Gou, Li; Wei, Bo; Sadiq, Rehan; Sadiq, Yong; Deng, Yong
2016-01-01
With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness's failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.
Distributed Clone Detection in Static Wireless Sensor Networks: Random Walk with Network Division
Khan, Wazir Zada; Aalsalem, Mohammed Y.; Saad, N. M.
2015-01-01
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads. PMID:25992913
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Novel mechanism of network protection against the new generation of cyber attacks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit
2012-06-01
A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.
Vulnerability survival analysis: a novel approach to vulnerability management
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; Sullivan, John; Cybenko, George
2017-05-01
Computer security vulnerabilities span across large, enterprise networks and have to be mitigated by security engineers on a routine basis. Presently, security engineers will assess their "risk posture" through quantifying the number of vulnerabilities with a high Common Vulnerability Severity Score (CVSS). Yet, little to no attention is given to the length of time by which vulnerabilities persist and survive on the network. In this paper, we review a novel approach to quantifying the length of time a vulnerability persists on the network, its time-to-death, and predictors of lower vulnerability survival rates. Our contribution is unique in that we apply the cox proportional hazards regression model to real data from an operational IT environment. This paper provides a mathematical overview of the theory behind survival analysis methods, a description of our vulnerability data, and an interpretation of the results.
Graph modeling systems and methods
Neergaard, Mike
2015-10-13
An apparatus and a method for vulnerability and reliability modeling are provided. The method generally includes constructing a graph model of a physical network using a computer, the graph model including a plurality of terminating vertices to represent nodes in the physical network, a plurality of edges to represent transmission paths in the physical network, and a non-terminating vertex to represent a non-nodal vulnerability along a transmission path in the physical network. The method additionally includes evaluating the vulnerability and reliability of the physical network using the constructed graph model, wherein the vulnerability and reliability evaluation includes a determination of whether each terminating and non-terminating vertex represents a critical point of failure. The method can be utilized to evaluate wide variety of networks, including power grid infrastructures, communication network topologies, and fluid distribution systems.
Neural Network Based Intrusion Detection System for Critical Infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Todd Vollmer; Ondrej Linda; Milos Manic
2009-07-01
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less
Lack of security of networked medical equipment in radiology.
Moses, Vinu; Korah, Ipeson
2015-02-01
OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.
A graph-based system for network-vulnerability analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.
1998-06-01
This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Wang, Xiang; Öngür, Dost; Auerbach, Randy P.; Yao, Shuqiao
2016-01-01
Abstract Although it is generally accepted that cognitive factors contribute to the pathogenesis of major depressive disorder (MDD), there are missing links between behavioral and biological models of depression. Nevertheless, research employing neuroimaging technologies has elucidated some of the neurobiological mechanisms related to cognitive-vulnerability factors, especially from a whole-brain, dynamic perspective. In this review, we integrate well-established cognitive-vulnerability factors for MDD and corresponding neural mechanisms in intrinsic networks using a dual-process framework. We propose that the dynamic alteration and imbalance among the intrinsic networks, both in the resting-state and the rest-task transition stages, contribute to the development of cognitive vulnerability and MDD. Specifically, we propose that abnormally increased resting-state default mode network (DMN) activity and connectivity (mainly in anterior DMN regions) contribute to the development of cognitive vulnerability. Furthermore, when subjects confront negative stimuli in the period of rest-to-task transition, the following three kinds of aberrant network interactions have been identified as facilitators of vulnerability and dysphoric mood, each through a different cognitive mechanism: DMN dominance over the central executive network (CEN), an impaired salience network–mediated switching between the DMN and CEN, and ineffective CEN modulation of the DMN. This focus on interrelated networks and brain-activity changes between rest and task states provides a neural-system perspective for future research on cognitive vulnerability and resilience, and may potentially guide the development of new intervention strategies for MDD. PMID:27148911
Report: Results of Technical Network Vulnerability Assessment: EPA’s Erlanger Building
Report #10-P-0211, September 7, 2010. Vulnerability testing of EPA’s Erlanger Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Report: Results of Technical Network Vulnerability Assessment: EPA’s Region 4
Report #10-P-0213, September 7, 2010. Vulnerability testing of EPA’s Region 4 network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Yu, Meichen; Engels, Marjolein M A; Hillebrand, Arjan; van Straaten, Elisabeth C W; Gouw, Alida A; Teunissen, Charlotte; van der Flier, Wiesje M; Scheltens, Philip; Stam, Cornelis J
2017-05-01
Although frequency-specific network analyses have shown that functional brain networks are altered in patients with Alzheimer's disease, the relationships between these frequency-specific network alterations remain largely unknown. Multiplex network analysis is a novel network approach to study complex systems consisting of subsystems with different types of connectivity patterns. In this study, we used magnetoencephalography to integrate five frequency-band specific brain networks in a multiplex framework. Previous structural and functional brain network studies have consistently shown that hub brain areas are selectively disrupted in Alzheimer's disease. Accordingly, we hypothesized that hub regions in the multiplex brain networks are selectively targeted in patients with Alzheimer's disease in comparison to healthy control subjects. Eyes-closed resting-state magnetoencephalography recordings from 27 patients with Alzheimer's disease (60.6 ± 5.4 years, 12 females) and 26 controls (61.8 ± 5.5 years, 14 females) were projected onto atlas-based regions of interest using beamforming. Subsequently, source-space time series for both 78 cortical and 12 subcortical regions were reconstructed in five frequency bands (delta, theta, alpha 1, alpha 2 and beta band). Multiplex brain networks were constructed by integrating frequency-specific magnetoencephalography networks. Functional connections between all pairs of regions of interests were quantified using a phase-based coupling metric, the phase lag index. Several multiplex hub and heterogeneity metrics were computed to capture both overall importance of each brain area and heterogeneity of the connectivity patterns across frequency-specific layers. Different nodal centrality metrics showed consistently that several hub regions, particularly left hippocampus, posterior parts of the default mode network and occipital regions, were vulnerable in patients with Alzheimer's disease compared to control subjects. Of note, these detected vulnerable hubs in Alzheimer's disease were absent in each individual frequency-specific network, thus showing the value of integrating the networks. The connectivity patterns of these vulnerable hub regions in the patients were heterogeneously distributed across layers. Perturbed cognitive function and abnormal cerebrospinal fluid amyloid-β42 levels correlated positively with the vulnerability of the hub regions in patients with Alzheimer's disease. Our analysis therefore demonstrates that the magnetoencephalography-based multiplex brain networks contain important information that cannot be revealed by frequency-specific brain networks. Furthermore, this indicates that functional networks obtained in different frequency bands do not act as independent entities. Overall, our multiplex network study provides an effective framework to integrate the frequency-specific networks with different frequency patterns and reveal neuropathological mechanism of hub disruption in Alzheimer's disease. © The Author (2017). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Reliable Communication Models in Interdependent Critical Infrastructure Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Sangkeun; Chinthavali, Supriya; Shankar, Mallikarjun
Modern critical infrastructure networks are becoming increasingly interdependent where the failures in one network may cascade to other dependent networks, causing severe widespread national-scale failures. A number of previous efforts have been made to analyze the resiliency and robustness of interdependent networks based on different models. However, communication network, which plays an important role in today's infrastructures to detect and handle failures, has attracted little attention in the interdependency studies, and no previous models have captured enough practical features in the critical infrastructure networks. In this paper, we study the interdependencies between communication network and other kinds of critical infrastructuremore » networks with an aim to identify vulnerable components and design resilient communication networks. We propose several interdependency models that systematically capture various features and dynamics of failures spreading in critical infrastructure networks. We also discuss several research challenges in building reliable communication solutions to handle failures in these models.« less
Report #09-P-0227, August 31, 2009. Vulnerability testing conducted in April 2009 of EPA’s Research Triangle Park Finance Center network identified Internet Protocol addresses with several highrisk vulnerabilities.
Report #09-P-0053, December 9, 2008. Vulnerability testing of EPA’s Radiation and Indoor Environments National Laboratory (R&IEN) network identified Internet Protocol addresses with medium-risk vulnerabilities.
Report: Results of Technical Network Vulnerability Assessment: EPA’s Ronald Reagan Building
Report #10-P-0212, September 7, 2010. Vulnerability testing of EPA’s Ronald Reagan Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Analysis of Network Vulnerability Under Joint Node and Link Attacks
NASA Astrophysics Data System (ADS)
Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting
2018-03-01
The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.
Lin, Yuxin; Chen, Feifei; Shen, Li; Tang, Xiaoyu; Du, Cui; Sun, Zhandong; Ding, Huijie; Chen, Jiajia; Shen, Bairong
2018-05-21
Prostate cancer (PCa) is a fatal malignant tumor among males in the world and the metastasis is a leading cause for PCa death. Biomarkers are therefore urgently needed to detect PCa metastatic signature at the early time. MicroRNAs are small non-coding RNAs with the potential to be biomarkers for disease prediction. In addition, computer-aided biomarker discovery is now becoming an attractive paradigm for precision diagnosis and prognosis of complex diseases. In this study, we identified key microRNAs as biomarkers for predicting PCa metastasis based on network vulnerability analysis. We first extracted microRNAs and mRNAs that were differentially expressed between primary PCa and metastatic PCa (MPCa) samples. Then we constructed the MPCa-specific microRNA-mRNA network and screened microRNA biomarkers by a novel bioinformatics model. The model emphasized the characterization of systems stability changes and the network vulnerability with three measurements, i.e. the structurally single-line regulation, the functional importance of microRNA targets and the percentage of transcription factor genes in microRNA unique targets. With this model, we identified five microRNAs as putative biomarkers for PCa metastasis. Among them, miR-101-3p and miR-145-5p have been previously reported as biomarkers for PCa metastasis and the remaining three, i.e. miR-204-5p, miR-198 and miR-152, were screened as novel biomarkers for PCa metastasis. The results were further confirmed by the assessment of their predictive power and biological function analysis. Five microRNAs were identified as candidate biomarkers for predicting PCa metastasis based on our network vulnerability analysis model. The prediction performance, literature exploration and functional enrichment analysis convinced our findings. This novel bioinformatics model could be applied to biomarker discovery for other complex diseases.
Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh
We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. Wemore » develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.« less
A New Random Walk for Replica Detection in WSNs.
Aalsalem, Mohammed Y; Khan, Wazir Zada; Saad, N M; Hossain, Md Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram
2016-01-01
Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical.
A New Random Walk for Replica Detection in WSNs
Aalsalem, Mohammed Y.; Saad, N. M.; Hossain, Md. Shohrab; Atiquzzaman, Mohammed; Khan, Muhammad Khurram
2016-01-01
Wireless Sensor Networks (WSNs) are vulnerable to Node Replication attacks or Clone attacks. Among all the existing clone detection protocols in WSNs, RAWL shows the most promising results by employing Simple Random Walk (SRW). More recently, RAND outperforms RAWL by incorporating Network Division with SRW. Both RAND and RAWL have used SRW for random selection of witness nodes which is problematic because of frequently revisiting the previously passed nodes that leads to longer delays, high expenditures of energy with lower probability that witness nodes intersect. To circumvent this problem, we propose to employ a new kind of constrained random walk, namely Single Stage Memory Random Walk and present a distributed technique called SSRWND (Single Stage Memory Random Walk with Network Division). In SSRWND, single stage memory random walk is combined with network division aiming to decrease the communication and memory costs while keeping the detection probability higher. Through intensive simulations it is verified that SSRWND guarantees higher witness node security with moderate communication and memory overheads. SSRWND is expedient for security oriented application fields of WSNs like military and medical. PMID:27409082
NV: Nessus Vulnerability Visualization for the Web
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harrison, Lane; Spahn, Riley B; Iannacone, Michael D
2012-01-01
Network vulnerability is a critical component of network se- curity. Yet vulnerability analysis has received relatively lit- tle attention from the security visualization community. In this paper we describe nv, a web-based Nessus vulnerability visualization. Nv utilizes treemaps and linked histograms to allow system administrators to discover, analyze, and man- age vulnerabilities on their networks. In addition to visual- izing single Nessus scans, nv supports the analysis of sequen- tial scans by showing which vulnerabilities have been fixed, remain open, or are newly discovered. Nv was also designed to operate completely in-browser, to avoid sending sensitive data to outside servers.more » We discuss the design of nv, as well as provide case studies demonstrating vulnerability analysis workflows which include a multiple-node testbed and data from the 2011 VAST Challenge.« less
Report #12-P-0900, September 27, 2012. Vulnerability testing of networked resources located in the NVFEL identified Internet Protocol addresses with potentially 9 critical-risk, 70 high-risk, and 297 medium-risk vulnerabilities.
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
Alajmi, Naser; Elleithy, Khaled
2015-01-01
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499
Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
Alajmi, Naser; Elleithy, Khaled
2015-11-19
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.
Design and implementation of website information disclosure assessment system.
Cho, Ying-Chiang; Pan, Jen-Yi
2015-01-01
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people's lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website's information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites.
1994-04-01
numerous articles on wireless LANs, only one by Lathrop discusses their vulnerabilities’. Lathrop’s paper provides an overview of wireless LANs and...to detect any action which deviates from the user’s observed recorded past behavior. These profiles list the operator’s commonly used commands, typing...current system activity audit records to rules describing past behavior patterns. W&S is especially effective in detecting rogue program penetrations. It
Report #10-P-0210, September 7, 2010. Vulnerability testing of EPA’s Andrew W. Breidenbach Environmental Research Center network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.
Impact analysis of two kinds of failure strategies in Beijing road transportation network
NASA Astrophysics Data System (ADS)
Zhang, Zundong; Xu, Xiaoyang; Zhang, Zhaoran; Zhou, Huijuan
The Beijing road transportation network (BRTN), as a large-scale technological network, exhibits very complex and complicate features during daily periods. And it has been widely highlighted that how statistical characteristics (i.e. average path length and global network efficiency) change while the network evolves. In this paper, by using different modeling concepts, three kinds of network models of BRTN namely the abstract network model, the static network model with road mileage as weights and the dynamic network model with travel time as weights — are constructed, respectively, according to the topological data and the real detected flow data. The degree distribution of the three kinds of network models are analyzed, which proves that the urban road infrastructure network and the dynamic network behavior like scale-free networks. By analyzing and comparing the important statistical characteristics of three models under random attacks and intentional attacks, it shows that the urban road infrastructure network and the dynamic network of BRTN are both robust and vulnerable.
Feature-based alert correlation in security systems using self organizing maps
NASA Astrophysics Data System (ADS)
Kumar, Munesh; Siddique, Shoaib; Noor, Humera
2009-04-01
The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.
Advanced Fault Diagnosis Methods in Molecular Networks
Habibi, Iman; Emamian, Effat S.; Abdi, Ali
2014-01-01
Analysis of the failure of cell signaling networks is an important topic in systems biology and has applications in target discovery and drug development. In this paper, some advanced methods for fault diagnosis in signaling networks are developed and then applied to a caspase network and an SHP2 network. The goal is to understand how, and to what extent, the dysfunction of molecules in a network contributes to the failure of the entire network. Network dysfunction (failure) is defined as failure to produce the expected outputs in response to the input signals. Vulnerability level of a molecule is defined as the probability of the network failure, when the molecule is dysfunctional. In this study, a method to calculate the vulnerability level of single molecules for different combinations of input signals is developed. Furthermore, a more complex yet biologically meaningful method for calculating the multi-fault vulnerability levels is suggested, in which two or more molecules are simultaneously dysfunctional. Finally, a method is developed for fault diagnosis of networks based on a ternary logic model, which considers three activity levels for a molecule instead of the previously published binary logic model, and provides equations for the vulnerabilities of molecules in a ternary framework. Multi-fault analysis shows that the pairs of molecules with high vulnerability typically include a highly vulnerable molecule identified by the single fault analysis. The ternary fault analysis for the caspase network shows that predictions obtained using the more complex ternary model are about the same as the predictions of the simpler binary approach. This study suggests that by increasing the number of activity levels the complexity of the model grows; however, the predictive power of the ternary model does not appear to be increased proportionally. PMID:25290670
NASA Astrophysics Data System (ADS)
Keen, Arthur A.
2006-04-01
This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.
NASA Astrophysics Data System (ADS)
Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting
2016-10-01
Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.
Doucet, Gaelle E; Bassett, Danielle S; Yao, Nailin; Glahn, David C; Frangou, Sophia
2017-12-01
Bipolar disorder is a heritable disorder characterized by mood dysregulation associated with brain functional dysconnectivity. Previous research has focused on the detection of risk- and disease-associated dysconnectivity in individuals with bipolar disorder and their first-degree relatives. The present study seeks to identify adaptive brain connectivity features associated with resilience, defined here as avoidance of illness or delayed illness onset in unaffected siblings of patients with bipolar disorder. Graph theoretical methods were used to examine global and regional brain network topology in head-motion-corrected resting-state functional MRI data acquired from 78 patients with bipolar disorder, 64 unaffected siblings, and 41 healthy volunteers. Global network properties were preserved in patients and their siblings while both groups showed reductions in the cohesiveness of the sensorimotor network. In the patient group, these sensorimotor network abnormalities were coupled with reduced integration of core default mode network regions in the ventromedial cortex and hippocampus. Conversely, integration of the default mode network was increased in the sibling group compared with both the patient group and the healthy volunteer group. The authors found that trait-related vulnerability to bipolar disorder was associated with reduced resting-state cohesiveness of the sensorimotor network in patients with bipolar disorder. However, integration of the default mode network emerged as a key feature differentiating disease expression and resilience between the patients and their siblings. This is indicative of the presence of neural mechanisms that may promote resilience, or at least delay illness onset.
Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks
NASA Astrophysics Data System (ADS)
Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi
2016-09-01
The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.
Measurement of traffic network vulnerability for Mississippi coastal region : final research report.
DOT National Transportation Integrated Search
2017-08-15
Natural disasters such as a hurricane can cause great damages to the transportation networks and significantly affect the evacuation trip operations. An accurate understanding and measurement of the network vulnerability can enhance the evacuees p...
Measuring Road Network Vulnerability with Sensitivity Analysis
Jun-qiang, Leng; Long-hai, Yang; Liu, Wei-yi; Zhao, Lin
2017-01-01
This paper focuses on the development of a method for road network vulnerability analysis, from the perspective of capacity degradation, which seeks to identify the critical infrastructures in the road network and the operational performance of the whole traffic system. This research involves defining the traffic utility index and modeling vulnerability of road segment, route, OD (Origin Destination) pair and road network. Meanwhile, sensitivity analysis method is utilized to calculate the change of traffic utility index due to capacity degradation. This method, compared to traditional traffic assignment, can improve calculation efficiency and make the application of vulnerability analysis to large actual road network possible. Finally, all the above models and calculation method is applied to actual road network evaluation to verify its efficiency and utility. This approach can be used as a decision-supporting tool for evaluating the performance of road network and identifying critical infrastructures in transportation planning and management, especially in the resource allocation for mitigation and recovery. PMID:28125706
2013-12-01
AbdelWahab, “ 2G / 3G Inter-RAT Handover Performance Analysis,” Second European Conference on Antennas and Propagation, pp. 1, 8, 11–16, Nov. 2007. [19] J...RADIO GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING by Carson C. McAbee... MOBILE COMMUNICATIONS TRANSMITTER DEVELOPMENT FOR HETEROGENEOUS NETWORK VULNERABILITY TESTING 5. FUNDING NUMBERS 6. AUTHOR(S) Carson C. McAbee
Ultra Wideband (UWB) communication vulnerability for security applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cooley, H. Timothy
2010-07-01
RF toxicity and Information Warfare (IW) are becoming omnipresent posing threats to the protection of nuclear assets, and within theatres of hostility or combat where tactical operation of wireless communication without detection and interception is important and sometimes critical for survival. As a result, a requirement for deployment of many security systems is a highly secure wireless technology manifesting stealth or covert operation suitable for either permanent or tactical deployment where operation without detection or interruption is important The possible use of ultra wideband (UWB) spectrum technology as an alternative physical medium for wireless network communication offers many advantages overmore » conventional narrowband and spread spectrum wireless communication. UWB also known as fast-frequency chirp is nonsinusoidal and sends information directly by transmitting sub-nanosecond pulses without the use of mixing baseband information upon a sinusoidal carrier. Thus UWB sends information using radar-like impulses by spreading its energy thinly over a vast spectrum and can operate at extremely low-power transmission within the noise floor where other forms of RF find it difficult or impossible to operate. As a result UWB offers low probability of detection (LPD), low probability of interception (LPI) as well as anti-jamming (AJ) properties in signal space. This paper analyzes and compares the vulnerability of UWB to narrowband and spread spectrum wireless network communication.« less
Securing mobile ad hoc networks using danger theory-based artificial immune algorithm.
Abdelhaq, Maha; Alsaqour, Raed; Abdelhaq, Shawkat
2015-01-01
A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs.
Securing Mobile Ad Hoc Networks Using Danger Theory-Based Artificial Immune Algorithm
2015-01-01
A mobile ad hoc network (MANET) is a set of mobile, decentralized, and self-organizing nodes that are used in special cases, such as in the military. MANET properties render the environment of this network vulnerable to different types of attacks, including black hole, wormhole and flooding-based attacks. Flooding-based attacks are one of the most dangerous attacks that aim to consume all network resources and thus paralyze the functionality of the whole network. Therefore, the objective of this paper is to investigate the capability of a danger theory-based artificial immune algorithm called the mobile dendritic cell algorithm (MDCA) to detect flooding-based attacks in MANETs. The MDCA applies the dendritic cell algorithm (DCA) to secure the MANET with additional improvements. The MDCA is tested and validated using Qualnet v7.1 simulation tool. This work also introduces a new simulation module for a flooding attack called the resource consumption attack (RCA) using Qualnet v7.1. The results highlight the high efficiency of the MDCA in detecting RCAs in MANETs. PMID:25946001
Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks
NASA Astrophysics Data System (ADS)
Song, Jae-Gu; Kim, Jong Hyun; Seo, Dong Il; Kim, Seoksoo
This study aims to reduce security vulnerabilities of sensor networks which transmit data in an open environment by developing a forecasting service system. The system is to remove or monitor causes of breach incidents in advance. To that end, this research first examines general security vulnerabilities of sensor networks and analyzes characteristics of existing forecasting systems. Then, 5 steps of a forecasting service system are proposed in order to improve security responses.
Small vulnerable sets determine large network cascades in power grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less
Small vulnerable sets determine large network cascades in power grids
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
2017-11-17
The understanding of cascading failures in complex systems has been hindered by the lack of realistic large-scale modeling and analysis that can account for variable system conditions. By using the North American power grid, we identified, quantified, and analyzed the set of network components that are vulnerable to cascading failures under any out of multiple conditions. We show that the vulnerable set consists of a small but topologically central portion of the network and that large cascades are disproportionately more likely to be triggered by initial failures close to this set. These results elucidate aspects of the origins and causesmore » of cascading failures relevant for grid design and operation and demonstrate vulnerability analysis methods that are applicable to a wider class of cascade-prone networks.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Christoph, G.G; Jackson, K.A.; Neuman, M.C.
An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year andmore » a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos` main computing network, the ICN.« less
An Efficient Method for Detecting Misbehaving Zone Manager in MANET
NASA Astrophysics Data System (ADS)
Rafsanjani, Marjan Kuchaki; Pakzad, Farzaneh; Asadinia, Sanaz
In recent years, one of the wireless technologies increased tremendously is mobile ad hoc networks (MANETs) in which mobile nodes organize themselves without the help of any predefined infrastructure. MANETs are highly vulnerable to attack due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring, management point and lack of a clear defense line. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. In our proposed scheme, the network with distributed hierarchical architecture is partitioned into zones, so that in each of them there is one zone manager. The zone manager is responsible for monitoring the cluster heads in its zone and cluster heads are in charge of monitoring their members. However, the most important problem is how the trustworthiness of the zone manager can be recognized. So, we propose a scheme in which "honest neighbors" of zone manager specify the validation of their zone manager. These honest neighbors prevent false accusations and also allow manager if it is wrongly misbehaving. However, if the manger repeats its misbehavior, then it will lose its management degree. Therefore, our scheme will be improved intrusion detection and also provide a more reliable network.
Nirmal Raja, K; Maraline Beno, M
2017-07-01
In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.
Basal melting of snow on early Mars: A possible origin of some valley networks
Carr, M.H.; Head, J. W.
2003-01-01
Valley networks appear to be cut by liquid water, yet simulations suggest that early Mars could not have been warmed enough by a CO2-H2O greenhouse to permit rainfall. The vulnerability of an early atmosphere to impact erosion, the likely rapid scavenging of CO2 from the atmosphere by weathering, and the lack of detection of weathering products all support a cold early Mars. We explore the hypothesis that valley networks could have formed as a result of basal melting of thick snow and ice deposits. Depending on the heat flow, an early snowpack a few hundred meters to a few kilometers thick could undergo basal melting, providing water to cut valley networks. Copyright 2003 by the American Geophysical Union.
Design and Implementation of Website Information Disclosure Assessment System
Cho, Ying-Chiang; Pan, Jen-Yi
2015-01-01
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people’s lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website’s information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites. PMID:25768434
NASA Astrophysics Data System (ADS)
Xi, Huixing
2017-03-01
With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shekar, Venkateswaran; Fiondella, Lance; Chatterjee, Samrat
Transportation networks are critical to the social and economic function of nations. Given the continuing increase in the populations of cities throughout the world, the criticality of transportation infrastructure is expected to increase. Thus, it is ever more important to mitigate congestion as well as to assess the impact disruptions would have on individuals who depend on transportation for their work and livelihood. Moreover, several government organizations are responsible for ensuring transportation networks are available despite the constant threat of natural disasters and terrorist activities. Most of the previous transportation network vulnerability research has been performed in the context ofmore » static traffic models, many of which are formulated as traditional optimization problems. However, transportation networks are dynamic because their usage varies over time. Thus, more appropriate methods to characterize the vulnerability of transportation networks should consider their dynamic properties. This paper presents a quantitative approach to assess the vulnerability of a transportation network to disruptions with methods from traffic simulation. Our approach can prioritize the critical links over time and is generalizable to the case where both link and node disruptions are of concern. We illustrate the approach through a series of examples. Our results demonstrate that the approach provides quantitative insight into the time varying criticality of links. Such an approach could be used as the objective function of less traditional optimization methods that use simulation and other techniques to evaluate the relative utility of a particular network defense to reduce vulnerability and increase resilience.« less
Information Assurance as a System of Systems in the Submarine Force
2013-09-01
cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network security...understand the cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network...Table 2. Assessment Scale– Vulnerability Severity (After NIST 800–30 Rev1 2012, F-2
Redshaw, Sarah; Ingham, Valerie; McCutcheon, Marion; Hicks, John; Burmeister, Oliver
2018-02-01
To assess the impact of network communications, community participation and elements of vulnerability on the perception of social cohesiveness in the Blue Mountains local government area (Blue Mountains LGA). A questionnaire was administered to residents of the Blue Mountains LGA. Econometric analysis of the resulting data was undertaken. Blue Mountains LGA, Australia. One thousand one hundred and three residents of the Blue Mountains LGA responded to the questionnaire. The responses enabled the construction of variables measuring individual perceptions of community cohesiveness, their network communications and community participation. Demographic data and data on the vulnerabilities of individuals were also collected. The data were used in an econometric model which identified that network communications and community participation impacted positively on perceptions of social cohesiveness while vulnerability factors had a negative impact. Remedial action to build community cohesiveness and network communications can be expected to have a positive impact on social cohesiveness. In developing strategies to build community cohesiveness and network communication, particular care needs to be taken to ensure the inclusion of those members of society who are regarded as the most vulnerable. © 2017 National Rural Health Alliance Inc.
Transport Traffic Analysis for Abusive Infrastructure Characterization
2012-12-14
Introduction Abusive traffic abounds on the Internet, in the form of email, malware, vulnerability scanners, worms, denial-of-service, drive-by-downloads, scam ...insight is two-fold. First, attackers have a basic requirement to source large amounts of data, be it denial-of-service, scam -hosting, spam, or other...the network core. This paper explores the power of transport-layer traffic analysis to detect and characterize scam hosting infrastructure, including
NASA Astrophysics Data System (ADS)
Chopra, Shauhrat S.; Khanna, Vikas
2015-10-01
Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling between CIS.
Drivers and Pattern of Social Vulnerability to Flood in Metropolitan Lagos, Nigeria
NASA Astrophysics Data System (ADS)
Fasona, M.
2016-12-01
Lagos is Africa's second largest city and a city-state in southwest Nigeria. Population and economic activities in the city are concentrated in the greater Lagos metropolitan area - a group of barrier islands less than a thousand square kilometer. Several physical factors and critical human-environmental conditions contribute to high flood vulnerability across the city. Flood impact is highly denominated and the poor tend to suffer more due to higher risk of exposure and poor adaptive capacity. In this study we present the pattern of social vulnerability to flooding across the Lagos metropolis and argued that the pattern substantially reflects the pattern and severity of flooding impact on people across the metropolis. Twenty nine social indicators and experiences including poverty profile, housing conditions, education, population and demography, social network, and communication, among others, were considered. The data were collated through field survey and subjected to principal component analysis. The results were processed into raster surfaces using GIS for social vulnerability characterization at neighborhood levels. The results suggest the social status indicators, neighborhood standing and social networks indictors, the indicators of emergency responses and security, and the neighborhood conditions, in that order, are the most important determinants of social vulnerability. Six of the 16 LGAs in metropolitan Lagos have high social vulnerability. Neighborhoods that combine poor social status indicators and poor neighborhood standing and social networks are found to have high social vulnerability whereas other poor neighborhoods with strong social networks performed better. We conclude that improved human living condition and social network and communication in poor urban neighborhoods are important to reducing social vulnerability to flooding in the metropolis.
The vulnerability of the global container shipping network to targeted link disruption
NASA Astrophysics Data System (ADS)
Viljoen, Nadia M.; Joubert, Johan W.
2016-11-01
Using complex network theory to describe the relational geography of maritime networks has provided great insights regarding their hierarchy and evolution over the past two decades. Unlike applications in other transport fields, notably air transport, complex network theory has had limited application in studying the vulnerability of maritime networks. This study uses targeted link disruption to investigate the strategy specific vulnerability of the network. Although nodal infrastructure such as ports can render a network vulnerable as a result of labour strikes, trade embargoes or natural disasters, it is the shipping lines connecting the ports that are more probably disrupted, either from within the industry, or outside. In this paper, we apply and evaluate two link-based disruption strategies on the global container shipping network, one based on link betweenness, and the other on link salience, to emulate the impact of large-scale service reconfiguration affecting priority links. The results show that the network is by and large robust to such reconfiguration. Meanwhile the flexibility of the network is reduced by both strategies, but to a greater degree by betweenness, resulting in a reduction of transshipment and dynamic rerouting potential amongst the busiest port regions. The results further show that the salience strategy is highly effective in reducing the commonality of shortest path sets, thereby diminishing opportunities for freight consolidation and scale economies.
NINJA: a noninvasive framework for internal computer security hardening
NASA Astrophysics Data System (ADS)
Allen, Thomas G.; Thomson, Steve
2004-07-01
Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing). It doesn"t take long to realize that the growth rate of vulnerabilities greatly exceeds the rate at which the vulnerabilities can be fixed. It also doesn"t take long to realize that our nation"s networks are growing less secure at an accelerating rate. As organizations become aware of vulnerabilities they may initiate efforts to resolve them, but quickly realize that the size of the remediation project is greater than their current resources can handle. In addition, many IT tools that suggest solutions to the problems in reality only address "some" of the vulnerabilities leaving the organization unsecured and back to square one in searching for solutions. This paper proposes an auditing framework called NINJA (acronym for Network Investigation Notification Joint Architecture) for noninvasive daily scanning/auditing based on common security vulnerabilities that repeatedly occur in a network environment. This framework is used for performing regular audits in order to harden an organizations security infrastructure. The framework is based on the results obtained by the Network Security Assessment Team (NSAT) which emulates adversarial computer network operations for US Air Force organizations. Auditing is the most time consuming factor involved in securing an organization's network infrastructure. The framework discussed in this paper uses existing scripting technologies to maintain a security hardened system at a defined level of performance as specified by the computer security audit team. Mobile agents which were under development at the time of this writing are used at a minimum to improve the noninvasiveness of our scans. In general, noninvasive scans with an adequate framework performed on a daily basis reduce the amount of security work load as well as the timeliness in performing remediation, as verified by the NINJA framework. A vulnerability assessment/auditing architecture based on mobile agent technology is proposed and examined at the end of the article as an enhancement to the current NINJA architecture.
NASA Astrophysics Data System (ADS)
Gopalakrishnan, G.
2013-12-01
In the aftermath of man-made disasters such as oil spills or natural disasters such as hurricanes and floods, city planners and residents of affected areas are often concerned about future vulnerabilities and rebuilding the area to increase resilience. However, identifying locations in the affected area that are most impacted by the disaster, the associated human health risks and potential vulnerabilities often require a monitoring effort that is expensive, time-consuming and difficult to implement in disaster-hit areas using traditional monitoring techniques. This project presents a framework for identifying areas that are most likely to be impacted by disasters by integrating remote sensing data and information from social media networks, including Twitter streams. The framework was tested for New York, coastal New Jersey and Staten Island in the aftermath of Hurricane Sandy. Vulnerable areas were identified using anomaly detection and the results were mapped against measurements collected on the ground. A correlation coefficient of 0.78 was obtained. Uncertainty in model predictions was evaluated using Monte Carlo simulations.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinthavali, Supriya; Shankar, Mallikarjun
Critical Infrastructure systems(CIs) such as energy, water, transportation and communication are highly interconnected and mutually dependent in complex ways. Robust modeling of CIs interconnections is crucial to identify vulnerabilities in the CIs. We present here a national-scale Infrastructure Vulnerability Analysis System (IVAS) vision leveraging Se- mantic Big Data (SBD) tools, Big Data, and Geographical Information Systems (GIS) tools. We survey existing ap- proaches on vulnerability analysis of critical infrastructures and discuss relevant systems and tools aligned with our vi- sion. Next, we present a generic system architecture and discuss challenges including: (1) Constructing and manag- ing a CI network-of-networks graph,more » (2) Performing analytic operations at scale, and (3) Interactive visualization of ana- lytic output to generate meaningful insights. We argue that this architecture acts as a baseline to realize a national-scale network based vulnerability analysis system.« less
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
An ethernet/IP security review with intrusion detection applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laughter, S. A.; Williams, R. D.
2006-07-01
Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IPmore » networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)« less
Development of a decision support tool for assessing vulnerability of transportation networks.
DOT National Transportation Integrated Search
2010-08-01
This research develops a decision support tool for assessing vulnerability of transportation networks. This report consists of 1) describing the trends of freight movements in Utah, 2) identifying the current and potential freight chokepoints/bottlen...
Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection.
Al-Jarrah, Omar Y; Alhussein, Omar; Yoo, Paul D; Muhaidat, Sami; Taha, Kamal; Kim, Kwangjo
2016-08-01
Botnets, which consist of remotely controlled compromised machines called bots, provide a distributed platform for several threats against cyber world entities and enterprises. Intrusion detection system (IDS) provides an efficient countermeasure against botnets. It continually monitors and analyzes network traffic for potential vulnerabilities and possible existence of active attacks. A payload-inspection-based IDS (PI-IDS) identifies active intrusion attempts by inspecting transmission control protocol and user datagram protocol packet's payload and comparing it with previously seen attacks signatures. However, the PI-IDS abilities to detect intrusions might be incapacitated by packet encryption. Traffic-based IDS (T-IDS) alleviates the shortcomings of PI-IDS, as it does not inspect packet payload; however, it analyzes packet header to identify intrusions. As the network's traffic grows rapidly, not only the detection-rate is critical, but also the efficiency and the scalability of IDS become more significant. In this paper, we propose a state-of-the-art T-IDS built on a novel randomized data partitioned learning model (RDPLM), relying on a compact network feature set and feature selection techniques, simplified subspacing and a multiple randomized meta-learning technique. The proposed model has achieved 99.984% accuracy and 21.38 s training time on a well-known benchmark botnet dataset. Experiment results demonstrate that the proposed methodology outperforms other well-known machine-learning models used in the same detection task, namely, sequential minimal optimization, deep neural network, C4.5, reduced error pruning tree, and randomTree.
A Legal Reasoning Component of a Network Security Command and Control System
2010-03-01
United States Code VA Vulnerability Assessment VLC Virtual Legal Cell xv ACKNOWLEDGMENTS The authors would like to humbly thank Professor Bret...cyberspace environment. In this thesis, the authors address the information warrior’s challenge of obtaining just-in-time legal advice. They...PROPOSED VIRTUAL DYNAMIC LEGAL CELL One of the challenges in cyberspace is to define and detect a hostile act or the use of force. Another major
Vulnerability of a killer whale social network to disease outbreaks
NASA Astrophysics Data System (ADS)
Guimarães, Paulo R., Jr.; de Menezes, Márcio Argollo; Baird, Robin W.; Lusseau, David; Guimarães, Paulo; Dos Reis, Sérgio F.
2007-10-01
Emerging infectious diseases are among the main threats to conservation of biological diversity. A crucial task facing epidemiologists is to predict the vulnerability of populations of endangered animals to disease outbreaks. In this context, the network structure of social interactions within animal populations may affect disease spreading. However, endangered animal populations are often small and to investigate the dynamics of small networks is a difficult task. Using network theory, we show that the social structure of an endangered population of mammal-eating killer whales is vulnerable to disease outbreaks. This feature was found to be a consequence of the combined effects of the topology and strength of social links among individuals. Our results uncover a serious challenge for conservation of the species and its ecosystem. In addition, this study shows that the network approach can be useful to study dynamical processes in very small networks.
NASA Astrophysics Data System (ADS)
Chen, Junhua
2013-03-01
To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.
Zheng, Yingjun; Wu, Chao; Li, Juanhua; Li, Ruikeng; Peng, Hongjun; She, Shenglin; Ning, Yuping; Li, Liang
2018-04-04
Speech recognition under noisy "cocktail-party" environments involves multiple perceptual/cognitive processes, including target detection, selective attention, irrelevant signal inhibition, sensory/working memory, and speech production. Compared to health listeners, people with schizophrenia are more vulnerable to masking stimuli and perform worse in speech recognition under speech-on-speech masking conditions. Although the schizophrenia-related speech-recognition impairment under "cocktail-party" conditions is associated with deficits of various perceptual/cognitive processes, it is crucial to know whether the brain substrates critically underlying speech detection against informational speech masking are impaired in people with schizophrenia. Using functional magnetic resonance imaging (fMRI), this study investigated differences between people with schizophrenia (n = 19, mean age = 33 ± 10 years) and their matched healthy controls (n = 15, mean age = 30 ± 9 years) in intra-network functional connectivity (FC) specifically associated with target-speech detection under speech-on-speech-masking conditions. The target-speech detection performance under the speech-on-speech-masking condition in participants with schizophrenia was significantly worse than that in matched healthy participants (healthy controls). Moreover, in healthy controls, but not participants with schizophrenia, the strength of intra-network FC within the bilateral caudate was positively correlated with the speech-detection performance under the speech-masking conditions. Compared to controls, patients showed altered spatial activity pattern and decreased intra-network FC in the caudate. In people with schizophrenia, the declined speech-detection performance under speech-on-speech masking conditions is associated with reduced intra-caudate functional connectivity, which normally contributes to detecting target speech against speech masking via its functions of suppressing masking-speech signals.
Rautureau, S; Dufour, B; Durand, B
2012-07-01
The networks generated by live animal movements are the principal vector for the propagation of infectious agents between farms, and their topology strongly affects how fast a disease may spread. The structural characteristics of networks may thus provide indicators of network vulnerability to the spread of infectious disease. This study applied social network analysis methods to describe the French swine trade network. Initial analysis involved calculating several parameters to characterize networks and then identifying high-risk subgroups of holdings for different time scales. Holding-specific centrality measurements ('degree', 'betweenness' and 'ingoing infection chain'), which summarize the place and the role of holdings in the network, were compared according to the production type. In addition, network components and communities, areas where connectedness is particularly high and could influence the speed and the extent of a disease, were identified and analysed. Dealer holdings stood out because of their high centrality values suggesting that these holdings may control the flow of animals in part of the network. Herds with growing units had higher values for degree and betweenness centrality, representing central positions for both spreading and receiving disease, whereas herds with finishing units had higher values for in-degree and ingoing infection chain centrality values and appeared more vulnerable with many contacts through live animal movements and thus at potentially higher risk for introduction of contagious diseases. This reflects the dynamics of the swine trade with downward movements along the production chain. But, the significant heterogeneity of farms with several production units did not reveal any particular type of production for targeting disease surveillance or control. Besides, no giant strong connected component was observed, the network being rather organized according to communities of small or medium size (<20% of network size). Because of this fragmentation, the swine trade network appeared less structurally vulnerable than ruminant trade networks. This fragmentation is explained by the hierarchical structure, which thus limits the structural vulnerability of the global trade network. However, inside communities, the hierarchical structure of the swine production system would favour the spread of an infectious agent (especially if introduced in breeding herds).
Culture, social networks and HIV vulnerability among men who have sex with men in Indonesia.
Fauk, Nelsensius Klau; Merry, Maria Silvia; Sigilipoe, Mitra Andhini; Putra, Sukma; Mwanri, Lillian
2017-01-01
The current study aimed to explore cultural and social network influence on HIV vulnerability among Men who have Sex with Men (MSM) population in Yogyakarta, Indonesia. A qualitative inquiry employing in-depth one-on-one interviews was carried out with 24 MSM participants in July 2015. Data were analysed using a framework analysis and guided by the Social Networks Theory (SNT) as a conceptual framework. Findings indicated that prohibitive cultural perspectives and norms against same-sex marriage made them to conceal their sexual orientation and thus secretively engaging in unprotected sex that increased their predisposition to HIV transmission. The prohibitive cultures were also instrumental in the formation of MSM sexual networks that provided supportive environment for HIV-risky sexual practices among network partners. These findings provide information that can be used to improve HIV/AIDS service practices and policies. However, further studies with large numbers of MSM would be needed to improve the understanding of other HIV vulnerability determinants, the unique needs of MSM, and what and how programs could be conducted to reduce HIV vulnerability among MSM population.
Vulnerability Analysis and Passenger Source Prediction in Urban Rail Transit Networks
Wang, Junjie; Li, Yishuai; Liu, Jingyu; He, Kun; Wang, Pu
2013-01-01
Based on large-scale human mobility data collected in San Francisco and Boston, the morning peak urban rail transit (URT) ODs (origin-destination matrix) were estimated and the most vulnerable URT segments, those capable of causing the largest service interruptions, were identified. In both URT networks, a few highly vulnerable segments were observed. For this small group of vital segments, the impact of failure must be carefully evaluated. A bipartite URT usage network was developed and used to determine the inherent connections between urban rail transits and their passengers' travel demands. Although passengers' origins and destinations were easy to locate for a large number of URT segments, a few show very complicated spatial distributions. Based on the bipartite URT usage network, a new layer of the understanding of a URT segment's vulnerability can be achieved by taking the difficulty of addressing the failure of a given segment into account. Two proof-of-concept cases are described here: Possible transfer of passenger flow to the road network is here predicted in the cases of failures of two representative URT segments in San Francisco. PMID:24260355
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
Cascading Failures and Recovery in Networks of Networks
NASA Astrophysics Data System (ADS)
Havlin, Shlomo
Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.
Assessing node risk and vulnerability in epidemics on networks
NASA Astrophysics Data System (ADS)
Rogers, T.
2015-01-01
Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense
NASA Astrophysics Data System (ADS)
Zhou, Mian; Lang, Sheau-Dong
2005-03-01
While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.
DOE Office of Scientific and Technical Information (OSTI.GOV)
MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.
Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less
Vulnerability of network of networks
NASA Astrophysics Data System (ADS)
Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.
2014-10-01
Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Propato, Marco; Uber, James G
2004-07-01
Can the spread of infectious disease through water distribution systems be halted by a disinfectant residual? This question is overdue for an answer. Regulatory agencies and water utilities have long been concerned about accidental intrusions of pathogens into distribution system pipelines (i.e., cross-connections) and are increasingly concerned about deliberate pathogen contamination. Here, a simulation framework is developed and used to assess the vulnerability of a water system to microbiological contamination. The risk of delivering contaminated water to consumers is quantified by a network water quality model that includes disinfectant decay and disinfection kinetics. The framework is applied to two example networks under a worst-case deliberate intrusion scenario. Results show that the risk of consumer exposure is affected by the residual maintenance strategy employed. The common regulation that demands a "detectable" disinfectant residual may not provide effective consumer protection against microbial contamination. A chloramine residual, instead of free chlorine, may significantly weaken this final barrier against pathogen intrusions. Moreover, the addition of a booster station at storage tanks may improve consumer protection without requiring excessive disinfectant.
Harden, Jennifer W.; Hugelius, Gustaf; Ahlström, Anders; Blankinship, Joseph C.; Bond-Lamberty, Ben; Lawrence, Corey; Loisel, Julie; Malhotra, Avni; Jackson, Robert B.; Ogle, Stephen M.; Phillips, Claire; Ryals, Rebecca; Todd-Brown, Katherine; Vargas, Rodrigo; Vergara, Sintana E.; Cotrufo, M. Francesca; Keiluweit, Marco; Heckman, Katherine; Crow, Susan E.; Silver, Whendee L.; DeLonge, Marcia; Nave, Lucas E.
2018-01-01
Soil organic matter (SOM) supports the Earth's ability to sustain terrestrial ecosystems, provide food and fiber, and retains the largest pool of actively cycling carbon. Over 75% of the soil organic carbon (SOC) in the top meter of soil is directly affected by human land use. Large land areas have lost SOC as a result of land use practices, yet there are compensatory opportunities to enhance productivity and SOC storage in degraded lands through improved management practices. Large areas with and without intentional management are also being subjected to rapid changes in climate, making many SOC stocks vulnerable to losses by decomposition or disturbance. In order to quantify potential SOC losses or sequestration at field, regional, and global scales, measurements for detecting changes in SOC are needed. Such measurements and soil-management best practices should be based on well established and emerging scientific understanding of processes of C stabilization and destabilization over various timescales, soil types, and spatial scales. As newly engaged members of the International Soil Carbon Network, we have identified gaps in data, modeling, and communication that underscore the need for an open, shared network to frame and guide the study of SOM and SOC and their management for sustained production and climate regulation.
Verifying the secure setup of UNIX client/servers and detection of network intrusion
NASA Astrophysics Data System (ADS)
Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.
1996-03-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.
Hidden Connectivity in Networks with Vulnerable Classes of Nodes
NASA Astrophysics Data System (ADS)
Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko
2016-10-01
In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
Harro, Jaanus; Kanarik, Margus; Kaart, Tanel; Matrov, Denis; Kõiv, Kadri; Mällo, Tanel; Del Río, Joaquin; Tordera, Rosa M; Ramirez, Maria J
2014-07-01
The large variety of available animal models has revealed much on the neurobiology of depression, but each model appears as specific to a significant extent, and distinction between stress response, pathogenesis of depression and underlying vulnerability is difficult to make. Evidence from epidemiological studies suggests that depression occurs in biologically predisposed subjects under impact of adverse life events. We applied the diathesis-stress concept to reveal brain regions and functional networks that mediate vulnerability to depression and response to chronic stress by collapsing data on cerebral long term neuronal activity as measured by cytochrome c oxidase histochemistry in distinct animal models. Rats were rendered vulnerable to depression either by partial serotonergic lesion or by maternal deprivation, or selected for a vulnerable phenotype (low positive affect, low novelty-related activity or high hedonic response). Environmental adversity was brought about by applying chronic variable stress or chronic social defeat. Several brain regions, most significantly median raphe, habenula, retrosplenial cortex and reticular thalamus, were universally implicated in long-term metabolic stress response, vulnerability to depression, or both. Vulnerability was associated with higher oxidative metabolism levels as compared to resilience to chronic stress. Chronic stress, in contrast, had three distinct patterns of effect on oxidative metabolism in vulnerable vs. resilient animals. In general, associations between regional activities in several brain circuits were strongest in vulnerable animals, and chronic stress disrupted this interrelatedness. These findings highlight networks that underlie resilience to stress, and the distinct response to stress that occurs in vulnerable subjects. Copyright © 2014 Elsevier B.V. All rights reserved.
A Transmission Availability Forecast Service for Internet Protocol Networks
1998-12-01
long term changes in the network situation. The probe measurement takes a finite period and so can aggregate and characterise short term variations in...network situation. Nevertheless, the process remains vulnerable to medium term variations, ie changes that occur after the probe and before the download...vulnerable to the medium term changes that might occur between the completion of the examination and the commencement of the download. 3.2 TAF
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks
Wang, Qiuhua
2017-01-01
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate. PMID:28165423
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.
Wang, Qiuhua
2017-02-04
Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.
Megacity megaquakes—Two near misses
Stein, Ross S.; Toda, Shinji
2013-01-01
Two recent earthquakes left their mark on Santiago de Chile and Tokyo, well beyond the rupture zones, raising questions about the future vulnerability of these and other cities that lie in seismically active regions. Though spared strong shaking, the megacities nevertheless lit up in small quakes, perhaps signaling an abrupt change in the condition for failure on the faults beneath the cities. To detect such changes in earthquake rate requires good seismic monitoring networks; to respond to such hazard increases with civic preparations requires good government.
Rogoza, Radosław; Żemojtel-Piotrowska, Magdalena; Kwiatkowska, Maria M; Kwiatkowska, Katarzyna
2018-01-01
Grandiose and vulnerable narcissism seem to be uncorrelated in empirical studies, yet they share at least some theoretical similarities. In the current study, we examine the relation between grandiose (conceptualized as admiration and rivalry) and vulnerable narcissism in the context of the Big Five personality traits and metatraits, self-esteem, and their nomological network. To this end, participants ( N = 314) filled in a set of self-report measures via an online survey. Rivalry was positively linked with both admiration and vulnerable narcissism. We replicated the relations of admiration and rivalry with personality traits and metatraits-as well as extended existing knowledge by providing support for the theory that vulnerable narcissism is simultaneously negatively related to the Stability and Plasticity. Higher scores on vulnerable narcissism and rivalry predicted having fragile self-esteem, whereas high scores on admiration predicted having optimal self-esteem. The assumed relations with the nomological network were confirmed, i.e., vulnerable narcissism and admiration demonstrated a contradictory pattern of relation to shyness and loneliness, whilst rivalry predicted low empathy. Our results suggest that the rivalry is between vulnerable narcissism and admiration, which supports its localization in the self-importance dimension of the narcissism spectrum model. It was concluded that whereas admiration and rivalry represent the bright and dark face of narcissism, vulnerable narcissism represents its blue face.
Rogoza, Radosław; Żemojtel-Piotrowska, Magdalena; Kwiatkowska, Maria M.; Kwiatkowska, Katarzyna
2018-01-01
Grandiose and vulnerable narcissism seem to be uncorrelated in empirical studies, yet they share at least some theoretical similarities. In the current study, we examine the relation between grandiose (conceptualized as admiration and rivalry) and vulnerable narcissism in the context of the Big Five personality traits and metatraits, self-esteem, and their nomological network. To this end, participants (N = 314) filled in a set of self-report measures via an online survey. Rivalry was positively linked with both admiration and vulnerable narcissism. We replicated the relations of admiration and rivalry with personality traits and metatraits—as well as extended existing knowledge by providing support for the theory that vulnerable narcissism is simultaneously negatively related to the Stability and Plasticity. Higher scores on vulnerable narcissism and rivalry predicted having fragile self-esteem, whereas high scores on admiration predicted having optimal self-esteem. The assumed relations with the nomological network were confirmed, i.e., vulnerable narcissism and admiration demonstrated a contradictory pattern of relation to shyness and loneliness, whilst rivalry predicted low empathy. Our results suggest that the rivalry is between vulnerable narcissism and admiration, which supports its localization in the self-importance dimension of the narcissism spectrum model. It was concluded that whereas admiration and rivalry represent the bright and dark face of narcissism, vulnerable narcissism represents its blue face. PMID:29593627
NASA Astrophysics Data System (ADS)
Azevedo, Hátylas; Moreira-Filho, Carlos Alberto
2015-11-01
Biological networks display high robustness against random failures but are vulnerable to targeted attacks on central nodes. Thus, network topology analysis represents a powerful tool for investigating network susceptibility against targeted node removal. Here, we built protein interaction networks associated with chemoresistance to temozolomide, an alkylating agent used in glioma therapy, and analyzed their modular structure and robustness against intentional attack. These networks showed functional modules related to DNA repair, immunity, apoptosis, cell stress, proliferation and migration. Subsequently, network vulnerability was assessed by means of centrality-based attacks based on the removal of node fractions in descending orders of degree, betweenness, or the product of degree and betweenness. This analysis revealed that removing nodes with high degree and high betweenness was more effective in altering networks’ robustness parameters, suggesting that their corresponding proteins may be particularly relevant to target temozolomide resistance. In silico data was used for validation and confirmed that central nodes are more relevant for altering proliferation rates in temozolomide-resistant glioma cell lines and for predicting survival in glioma patients. Altogether, these results demonstrate how the analysis of network vulnerability to topological attack facilitates target prioritization for overcoming cancer chemoresistance.
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
Grid Transmission Expansion Planning Model Based on Grid Vulnerability
NASA Astrophysics Data System (ADS)
Tang, Quan; Wang, Xi; Li, Ting; Zhang, Quanming; Zhang, Hongli; Li, Huaqiang
2018-03-01
Based on grid vulnerability and uniformity theory, proposed global network structure and state vulnerability factor model used to measure different grid models. established a multi-objective power grid planning model which considering the global power network vulnerability, economy and grid security constraint. Using improved chaos crossover and mutation genetic algorithm to optimize the optimal plan. For the problem of multi-objective optimization, dimension is not uniform, the weight is not easy given. Using principal component analysis (PCA) method to comprehensive assessment of the population every generation, make the results more objective and credible assessment. the feasibility and effectiveness of the proposed model are validated by simulation results of Garver-6 bus system and Garver-18 bus.
Attack Vulnerability of Network Controllability
2016-01-01
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941
Attack Vulnerability of Network Controllability.
Lu, Zhe-Ming; Li, Xin-Feng
2016-01-01
Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.
Verifying the secure setup of Unix client/servers and detection of network intrusion
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feingold, R.; Bruestle, H.R.; Bartoletti, T.
1995-07-01
This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-13
... to, or access by, external systems and networks may result in security vulnerabilities to the... configuration may allow the exploitation of network security vulnerabilities resulting in intentional or..., Models ATR42-500 and ATR72-212A Airplanes; Aircraft Electronic System Security Protection From...
Day-Ahead Anticipation of Complex Network Vulnerability
NASA Astrophysics Data System (ADS)
Stefanov, S. Z.; Wang, Paul P.
2017-11-01
In this paper, a day-ahead anticipation of complex network vulnerability for an intentional threat of an attack or a shock is carried out. An ecological observer is introduced for that reason, which is a watch in the intentional multiverse, tiled by cells; dynamics of the intentional threat for a day-ahead is characterized by a space-time cell; spreading of the intentional threat is derived from its energy; duration of the intentional threat is found by the self-assembling of a space-time cell; the lower bound of probability is assessed to anticipate for a day-ahead the intentional threat; it is indicated that this vulnerability anticipation for a day-ahead is right when the intentional threat leads to dimension doubling of the complex network.
Gómez, José M; Verdú, Miguel
2017-03-06
Epidemics can spread across large regions becoming pandemics by flowing along transportation and social networks. Two network attributes, transitivity (when a node is connected to two other nodes that are also directly connected between them) and centrality (the number and intensity of connections with the other nodes in the network), are widely associated with the dynamics of transmission of pathogens. Here we investigate how network centrality and transitivity influence vulnerability to diseases of human populations by examining one of the most devastating pandemic in human history, the fourteenth century plague pandemic called Black Death. We found that, after controlling for the city spatial location and the disease arrival time, cities with higher values of both centrality and transitivity were more severely affected by the plague. A simulation study indicates that this association was due to central cities with high transitivity undergo more exogenous re-infections. Our study provides an easy method to identify hotspots in epidemic networks. Focusing our effort in those vulnerable nodes may save time and resources by improving our ability of controlling deadly epidemics.
Rautureau, S; Dufour, B; Durand, B
2011-04-01
Besides farming, trade of livestock is a major component of agricultural economy. However, the networks generated by live animal movements are the major support for the propagation of infectious agents between farms, and their structure strongly affects how fast a disease may spread. Structural characteristics may thus be indicators of network vulnerability to the spread of infectious disease. The method proposed here is based upon the analysis of specific subnetworks: the giant strongly connected components (GSCs). Their existence, size and geographic extent are used to assess network vulnerability. Their disappearance when targeted nodes are removed allows studying how network vulnerability may be controlled under emergency conditions. The method was applied to the cattle trade network in France, 2005. Giant strongly connected components were present and widely spread all over the country in yearly, monthly and weekly networks. Among several tested approaches, the most efficient way to make GSCs disappear was based on the ranking of nodes by decreasing betweenness centrality (the proportion of shortest paths between nodes on which a specific node lies). Giant strongly connected components disappearance was obtained after removal of <1% of network nodes. Under emergency conditions, suspending animal trade activities in a small subset of holdings may thus allow to control the spread of an infectious disease through the animal trade network. Nodes representing markets and dealers were widely affected by these simulated control measures. This confirms their importance as 'hubs' for infectious diseases spread. Besides emergency conditions, specific sensitization and preventive measures should be dedicated to this population. © 2010 Blackwell Verlag GmbH.
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%. PMID:27494411
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.
Resilience of networks to environmental stress: From regular to random networks
NASA Astrophysics Data System (ADS)
Eom, Young-Ho
2018-04-01
Despite the huge interest in network resilience to stress, most of the studies have concentrated on internal stress damaging network structure (e.g., node removals). Here we study how networks respond to environmental stress deteriorating their external conditions. We show that, when regular networks gradually disintegrate as environmental stress increases, disordered networks can suddenly collapse at critical stress with hysteresis and vulnerability to perturbations. We demonstrate that this difference results from a trade-off between node resilience and network resilience to environmental stress. The nodes in the disordered networks can suppress their collapses due to the small-world topology of the networks but eventually collapse all together in return. Our findings indicate that some real networks can be highly resilient against environmental stress to a threshold yet extremely vulnerable to the stress above the threshold because of their small-world topology.
Harden, Jennifer W; Hugelius, Gustaf; Ahlström, Anders; Blankinship, Joseph C; Bond-Lamberty, Ben; Lawrence, Corey R; Loisel, Julie; Malhotra, Avni; Jackson, Robert B; Ogle, Stephen; Phillips, Claire; Ryals, Rebecca; Todd-Brown, Katherine; Vargas, Rodrigo; Vergara, Sintana E; Cotrufo, M Francesca; Keiluweit, Marco; Heckman, Katherine A; Crow, Susan E; Silver, Whendee L; DeLonge, Marcia; Nave, Lucas E
2018-02-01
Soil organic matter (SOM) supports the Earth's ability to sustain terrestrial ecosystems, provide food and fiber, and retains the largest pool of actively cycling carbon. Over 75% of the soil organic carbon (SOC) in the top meter of soil is directly affected by human land use. Large land areas have lost SOC as a result of land use practices, yet there are compensatory opportunities to enhance productivity and SOC storage in degraded lands through improved management practices. Large areas with and without intentional management are also being subjected to rapid changes in climate, making many SOC stocks vulnerable to losses by decomposition or disturbance. In order to quantify potential SOC losses or sequestration at field, regional, and global scales, measurements for detecting changes in SOC are needed. Such measurements and soil-management best practices should be based on well established and emerging scientific understanding of processes of C stabilization and destabilization over various timescales, soil types, and spatial scales. As newly engaged members of the International Soil Carbon Network, we have identified gaps in data, modeling, and communication that underscore the need for an open, shared network to frame and guide the study of SOM and SOC and their management for sustained production and climate regulation. © 2017 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Vulnerability to shocks in the global seafood trade network
NASA Astrophysics Data System (ADS)
Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke
2016-03-01
Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.
A Systems Approach to Agricultural Biosecurity.
Anand, Manish
This article highlights the importance of systems approaches in addressing agricultural biosecurity threats. On the basis of documentary analysis and stakeholder interaction, a brief survey of agricultural biosecurity threats and vulnerabilities from global and Indian perspectives is provided, followed by an exploration of technological and institutional capabilities. Finally, a perspective on the agricultural disease diagnostic networks is provided, drawing instances from global developments. Technical barriers to agroterrorism are lower than those to human-targeted bioterrorism, and the sector is unique as even a very small disease outbreak could prompt international export restrictions. Key vulnerabilities in the agriculture sector stem from, among others, the structure of agricultural production; insufficient monitoring, surveillance, and controls systems at the borders and in the food chain; inefficient systems for reporting unusual occurrences and outbreaks of disease; and lack of sufficiently trained human resources capable of recognizing or treating transboundary pathogens and diseases. An assessment of technology and institutions pertaining to crop and animal protection management suggests certain gaps. Investment in developing new technologies for civilian application in agriculture, as well as for legitimate actions pertaining to defense, detection, protection, and prophylaxis, and in upgrading laboratory facilities can increase the agricultural sector's level of preparedness for outbreaks. To address potential threats and vulnerabilities of agroterrorism effectively requires the development of a comprehensive strategy and a combined, interagency approach, ideally on an international level. It is proposed that a systems-oriented approach for developing knowledge and innovation networks and strengthening skills and capacities would enable a more resilient agricultural biosecurity system.
Baghapour, Mohammad Ali; Fadaei Nobandegani, Amir; Talebbeydokhti, Nasser; Bagherzadeh, Somayeh; Nadiri, Ata Allah; Gharekhani, Maryam; Chitsazan, Nima
2016-01-01
Extensive human activities and unplanned land uses have put groundwater resources of Shiraz plain at a high risk of nitrate pollution, causing several environmental and human health issues. To address these issues, water resources managers utilize groundwater vulnerability assessment and determination of protection. This study aimed to prepare the vulnerability maps of Shiraz aquifer by using Composite DRASTIC index, Nitrate Vulnerability index, and artificial neural network and also to compare their efficiency. The parameters of the indexes that were employed in this study are: depth to water table, net recharge, aquifer media, soil media, topography, impact of the vadose zone, hydraulic conductivity, and land use. These parameters were rated, weighted, and integrated using GIS, and then, used to develop the risk maps of Shiraz aquifer. The results indicated that the southeastern part of the aquifer was at the highest potential risk. Given the distribution of groundwater nitrate concentrations from the wells in the underlying aquifer, the artificial neural network model offered greater accuracy compared to the other two indexes. The study concluded that the artificial neural network model is an effective model to improve the DRASTIC index and provides a confident estimate of the pollution risk. As intensive agricultural activities are the dominant land use and water table is shallow in the vulnerable zones, optimized irrigation techniques and a lower rate of fertilizers are suggested. The findings of our study could be used as a scientific basis in future for sustainable groundwater management in Shiraz plain.
Vulnerability analysis methods for road networks
NASA Astrophysics Data System (ADS)
Bíl, Michal; Vodák, Rostislav; Kubeček, Jan; Rebok, Tomáš; Svoboda, Tomáš
2014-05-01
Road networks rank among the most important lifelines of modern society. They can be damaged by either random or intentional events. Roads are also often affected by natural hazards, the impacts of which are both direct and indirect. Whereas direct impacts (e.g. roads damaged by a landslide or due to flooding) are localized in close proximity to the natural hazard occurrence, the indirect impacts can entail widespread service disabilities and considerable travel delays. The change in flows in the network may affect the population living far from the places originally impacted by the natural disaster. These effects are primarily possible due to the intrinsic nature of this system. The consequences and extent of the indirect costs also depend on the set of road links which were damaged, because the road links differ in terms of their importance. The more robust (interconnected) the road network is, the less time is usually needed to secure the serviceability of an area hit by a disaster. These kinds of networks also demonstrate a higher degree of resilience. Evaluating road network structures is therefore essential in any type of vulnerability and resilience analysis. There are a range of approaches used for evaluation of the vulnerability of a network and for identification of the weakest road links. Only few of them are, however, capable of simulating the impacts of the simultaneous closure of numerous links, which often occurs during a disaster. The primary problem is that in the case of a disaster, which usually has a large regional extent, the road network may remain disconnected. The majority of the commonly used indices use direct computation of the shortest paths or time between OD (origin - destination) pairs and therefore cannot be applied when the network breaks up into two or more components. Since extensive break-ups often occur in cases of major disasters, it is important to study the network vulnerability in these cases as well, so that appropriate steps can be taken in order to make it more resilient. Performing such an analysis of network break-ups requires consideration of the network as a whole, ideally identifying all the cases generated by simultaneous closure of multiple links and evaluating them using various criteria. The spatial distribution of settlements, important companies and the overall population in the nodes of the network are several factors, apart from the topology of the network which could be taken into account when computing vulnerability indices and identifying the weakest links and/or weakest link combinations. However, even for small networks (i.e., hundreds of nodes and links), the problem of break-up identification becomes extremely difficult to resolve. The naive approaches of the brute force examination consequently fail and more elaborated algorithms have to be applied. We address the problem of evaluating the vulnerability of road networks in our work by simulating the impacts of the simultaneous closure of multiple roads/links. We present an ongoing work on a sophisticated algorithm focused on the identification of network break-ups and evaluating them by various criteria.
How to Perform a Security Audit: Is Your School's or District's Network Vulnerable?
ERIC Educational Resources Information Center
Dark, Melissa; Poftak, Amy
2004-01-01
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
A Vulnerability Assessment of the U.S. Small Business B2C E-Commerce Network Systems
ERIC Educational Resources Information Center
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A.
2011-01-01
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
NASA Astrophysics Data System (ADS)
El Mountassir, M.; Yaacoubi, S.; Dahmene, F.
2015-07-01
Intelligent feature extraction and advanced signal processing techniques are necessary for a better interpretation of ultrasonic guided waves signals either in structural health monitoring (SHM) or in nondestructive testing (NDT). Such signals are characterized by at least multi-modal and dispersive components. In addition, in SHM, these signals are closely vulnerable to environmental and operational conditions (EOCs), and can be severely affected. In this paper we investigate the use of Artificial Neural Network (ANN) to overcome these effects and to provide a reliable damage detection method with a minimal of false indications. An experimental case of study (full scale pipe) is presented. Damages sizes have been increased and their shapes modified in different steps. Various parameters such as the number of inputs and the number of hidden neurons were studied to find the optimal configuration of the neural network.
Robustness analysis of interdependent networks under multiple-attacking strategies
NASA Astrophysics Data System (ADS)
Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie
2018-04-01
The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.
Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; ...
2017-03-20
Increased coupling between critical infrastructure networks, such as power and communication systems, has important implications for the reliability and security of these systems. To understand the effects of power-communication coupling, several researchers have studied models of interdependent networks and reported that increased coupling can increase vulnerability. However, these conclusions come largely from models that have substantially different mechanisms of cascading failure, relative to those found in actual power and communication networks, and that do not capture the benefits of connecting systems with complementary capabilities. In order to understand the importance of these details, this paper compares network vulnerability in simplemore » topological models and in models that more accurately capture the dynamics of cascading in power systems. First, we compare a simple model of topological contagion to a model of cascading in power systems and find that the power grid model shows a higher level of vulnerability, relative to the contagion model. Second, we compare a percolation model of topological cascading in coupled networks to three different models of power networks coupled to communication systems. Again, the more accurate models suggest very different conclusions than the percolation model. In all but the most extreme case, the physics-based power grid models indicate that increased power-communication coupling decreases vulnerability. This is opposite from what one would conclude from the percolation model, in which zero coupling is optimal. Only in an extreme case, in which communication failures immediately cause grid failures, did we find that increased coupling can be harmful. Together, these results suggest design strategies for reducing the risk of cascades in interdependent infrastructure systems.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pollet, J.
2006-07-01
This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-criticalmore » networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)« less
Branger, B; Rouger, V; Berlie, I; Beucher, A; Flamant, C; N'guyen The Tich, S; Garcia, J; Brossier, J-P; Montcho, Y; Hanf, M; Roze, J-C
2015-02-01
Vulnerable children are at-risk newborns including premature infants and some children with pathologies presented by fear anomalies and deficiencies, most particularly neurological. Monitoring is based on the detection of these abnormalities and their early management. The organization of this monitoring system is based on a network of doctors, mostly pediatricians, trained regularly. The objective of this review was to assess the resources, means, and results of 10 years of follow-up. The Pays de la Loire network includes 24 maternity wards and 13 neonatal departments. Annual admissions are around 5000 newborns to approximately 45,000 annual births. Upon discharge of newborns, born prematurely at 34 weeks of gestation (WG) or less, or term infants with neurological problems, parents are asked to have their child monitored by a referring doctor. During the consultation, a reference document is filled out by the doctor and sent to the project manager for data collection and specific compensation for private practitioners. Standardized questionnaires were used such as the ASQ (Ages and Stage Questionnaire) completed by parents, the developmental quotient (DQ) with the Lézine Brunet-Revised test (BLR), the intelligence quotient (IQ) with the Wechsler Preschool and Primary Scale of Intelligence (WIPPSI III) completed by psychologists employed in the network, and a questionnaire completed by the teacher at 5 years of age. The network started on 1st March 2003, and 28th February 2013, after 10 years of inclusion, 10,800 children had been included. This population accounts for 2.4% of all annual births: 1.1% were included for prematurity less than 33 weeks and 0.25% were term-born infants. The characteristics of children are presented with gestational age, birth weight, and obstetric and neonatal pathologies. The percentage of these children followed was 80% at 2 years and 63% at 5 years. At 2 years, the results are presented according to gestational age with approximately 60% of children without disabilities at 25-26 WG, 73% at 27-28 WG, 77% at 29-30 WG, and 86% at 31-32 WG. Absorptions are diverse and vary according to the age of the child with physical therapy, psychomotor skill work, speech therapy, hearing and vision consultations, and psychology/psychiatry. Assessment tools were refined by specific analyses: the ASQ 24 months (completed by parents) was deemed valid and predictive with respect to IQ (abandoned in 2012), and the grid completed by the teacher was found to predict abnormalities in 5 years. The Pays de la Loire monitoring network has met its initial objective, namely to detect disabilities early and provide practical help to parents in a population of vulnerable children. Benefits for professionals and other children not followed in the network were observed, with an increase in pediatricians' skills. The benefits of the evaluation results are more difficult to assess with the care than neonatal care in obstetrics. The sustainability of such a network seems assured for healthcare professionals, provided that funding is maintained by the health authorities. Copyright © 2014 Elsevier Masson SAS. All rights reserved.
PeerShield: determining control and resilience criticality of collaborative cyber assets in networks
NASA Astrophysics Data System (ADS)
Cam, Hasan
2012-06-01
As attackers get more coordinated and advanced in cyber attacks, cyber assets are required to have much more resilience, control effectiveness, and collaboration in networks. Such a requirement makes it essential to take a comprehensive and objective approach for measuring the individual and relative performances of cyber security assets in network nodes. To this end, this paper presents four techniques as to how the relative importance of cyber assets can be measured more comprehensively and objectively by considering together the main variables of risk assessment (e.g., threats, vulnerabilities), multiple attributes (e.g., resilience, control, and influence), network connectivity and controllability among collaborative cyber assets in networks. In the first technique, a Bayesian network is used to include the random variables for control, recovery, and resilience attributes of nodes, in addition to the random variables of threats, vulnerabilities, and risk. The second technique shows how graph matching and coloring can be utilized to form collaborative pairs of nodes to shield together against threats and vulnerabilities. The third technique ranks the security assets of nodes by incorporating multiple weights and thresholds of attributes into a decision-making algorithm. In the fourth technique, the hierarchically well-separated tree is enhanced to first identify critical nodes of a network with respect to their attributes and network connectivity, and then selecting some nodes as driver nodes for network controllability.
[Mapping environmental vulnerability from ETM + data in the Yellow River Mouth Area].
Wang, Rui-Yan; Yu, Zhen-Wen; Xia, Yan-Ling; Wang, Xiang-Feng; Zhao, Geng-Xing; Jiang, Shu-Qian
2013-10-01
The environmental vulnerability retrieval is important to support continuing data. The spatial distribution of regional environmental vulnerability was got through remote sensing retrieval. In view of soil and vegetation, the environmental vulnerability evaluation index system was built, and the environmental vulnerability of sampling points was calculated by the AHP-fuzzy method, then the correlation between the sampling points environmental vulnerability and ETM + spectral reflectance ratio including some kinds of conversion data was analyzed to determine the sensitive spectral parameters. Based on that, models of correlation analysis, traditional regression, BP neural network and support vector regression were taken to explain the quantitative relationship between the spectral reflectance and the environmental vulnerability. With this model, the environmental vulnerability distribution was retrieved in the Yellow River Mouth Area. The results showed that the correlation between the environmental vulnerability and the spring NDVI, the September NDVI and the spring brightness was better than others, so they were selected as the sensitive spectral parameters. The model precision result showed that in addition to the support vector model, the other model reached the significant level. While all the multi-variable regression was better than all one-variable regression, and the model accuracy of BP neural network was the best. This study will serve as a reliable theoretical reference for the large spatial scale environmental vulnerability estimation based on remote sensing data.
Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua
2014-05-07
Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or 'piggybacking' disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.
Design and Implementation of a Secure Modbus Protocol
NASA Astrophysics Data System (ADS)
Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto
The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.
Heterogeneous information sharing of sensor information in contested environments
NASA Astrophysics Data System (ADS)
Wampler, Jason A.; Hsieh, Chien; Toth, Andrew; Sheatsley, Ryan
2017-05-01
The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R and E) project, "Smoke Screen in Cyberspace", was demonstrated in a live, over-the-air experiment. Smoke Screen encrypts, slices up, and disburses redundant fragments of files throughout the network. Recovery is only possible after recovering all fragments and attacking/denying one or more nodes does not limit the availability of other fragment copies in the network. This experiment proved the feasibility of redundant file fragmentation, and is the foundation for developing sophisticated methods to blacklist compromised nodes, move data fragments from risks of compromise, and forward stored data fragments closer to the anticipated retrieval point. This paper outlines initial results in scalability of node members, fragment size, file size, and performance in a heterogeneous network consisting of the Wireless Network after Next (WNaN) radio and Common Sensor Radio (CSR).
Virtual terrain: a security-based representation of a computer network
NASA Astrophysics Data System (ADS)
Holsopple, Jared; Yang, Shanchieh; Argauer, Brian
2008-03-01
Much research has been put forth towards detection, correlating, and prediction of cyber attacks in recent years. As this set of research progresses, there is an increasing need for contextual information of a computer network to provide an accurate situational assessment. Typical approaches adopt contextual information as needed; yet such ad hoc effort may lead to unnecessary or even conflicting features. The concept of virtual terrain is, therefore, developed and investigated in this work. Virtual terrain is a common representation of crucial information about network vulnerabilities, accessibilities, and criticalities. A virtual terrain model encompasses operating systems, firewall rules, running services, missions, user accounts, and network connectivity. It is defined as connected graphs with arc attributes defining dynamic relationships among vertices modeling network entities, such as services, users, and machines. The virtual terrain representation is designed to allow feasible development and maintenance of the model, as well as efficacy in terms of the use of the model. This paper will describe the considerations in developing the virtual terrain schema, exemplary virtual terrain models, and algorithms utilizing the virtual terrain model for situation and threat assessment.
Data security issues arising from integration of wireless access into healthcare networks.
Frenzel, John C
2003-04-01
The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence.
Korkali, Mert; Veneman, Jason G; Tivnan, Brian F; Bagrow, James P; Hines, Paul D H
2017-03-20
Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a "smart" power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
NASA Astrophysics Data System (ADS)
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.
2017-03-01
Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.
Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence
Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.
2017-01-01
Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained. PMID:28317835
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Sisi; Li, Yun; Levitt, Karl N.
Consensus is a fundamental approach to implementing fault-tolerant services through replication where there exists a tradeoff between the cost and the resilience. For instance, Crash Fault Tolerant (CFT) protocols have a low cost but can only handle crash failures while Byzantine Fault Tolerant (BFT) protocols handle arbitrary failures but have a higher cost. Hybrid protocols enjoy the benefits of both high performance without failures and high resiliency under failures by switching among different subprotocols. However, it is challenging to determine which subprotocols should be used. We propose a moving target approach to switch among protocols according to the existing systemmore » and network vulnerability. At the core of our approach is a formalized cost model that evaluates the vulnerability and performance of consensus protocols based on real-time Intrusion Detection System (IDS) signals. Based on the evaluation results, we demonstrate that a safe, cheap, and unpredictable protocol is always used and a high IDS error rate can be tolerated.« less
Fully automatic cervical vertebrae segmentation framework for X-ray images.
Al Arif, S M Masudur Rahman; Knapp, Karen; Slabaugh, Greg
2018-04-01
The cervical spine is a highly flexible anatomy and therefore vulnerable to injuries. Unfortunately, a large number of injuries in lateral cervical X-ray images remain undiagnosed due to human errors. Computer-aided injury detection has the potential to reduce the risk of misdiagnosis. Towards building an automatic injury detection system, in this paper, we propose a deep learning-based fully automatic framework for segmentation of cervical vertebrae in X-ray images. The framework first localizes the spinal region in the image using a deep fully convolutional neural network. Then vertebra centers are localized using a novel deep probabilistic spatial regression network. Finally, a novel shape-aware deep segmentation network is used to segment the vertebrae in the image. The framework can take an X-ray image and produce a vertebrae segmentation result without any manual intervention. Each block of the fully automatic framework has been trained on a set of 124 X-ray images and tested on another 172 images, all collected from real-life hospital emergency rooms. A Dice similarity coefficient of 0.84 and a shape error of 1.69 mm have been achieved. Copyright © 2018 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Kent, G. M.; Smith, K. D.; Williams, M. C.; Slater, D. E.; Plank, G.; McCarthy, M.; Rojas-Gonzalez, R.; Vernon, F.; Driscoll, N. W.; Hidley, G.
2015-12-01
The Nevada Seismological Laboratory (NSL) at UNR has recently embarked on a bold technical initiative, installing a high-speed (up to 190 Mb/sec) mountaintop-based Internet Protocol (IP) microwave network, enabling a myriad of sensor systems for Multi-Hazard Early Warning detection and response. In the Tahoe Basin, this system is known as AlertTahoe; a similar network has been deployed in north-central Nevada as part of a 5-year-long grant with BLM. The UNR network mirrors the successful HPWREN multi-hazard network run through UCSD; the UNR "Alert" program (Access to Leverage Emergency information in Real Time) has expanded on the original concept by providing a framework for early fire detection and discovery. Both systems do not rely on open-access public Internet services such as those provided by cellular service providers. Instead, they utilize private wireless communication networks to collect data 24/7 in real-time from multiple sensors throughout the system. Utilizing this restricted-access private communication platform enhances system reliability, capability, capacity and versatility for staff and its community of certified users. Both UNR and UCSD fire camera systems are presently being confederated under a common framework to provide end users (e.g., BLM, USFS, CalFire) a unified interface. Earthquake response has been both organizations' primary mission for decades; high-speed IP microwave fundamentally changes the playing field allowing for rapid early detection of wildfires, earthquakes and other natural disasters, greatly improving local and regional disaster response/recovery. For example, networked cameras can be optimally placed for wildfire detection and are significantly less vulnerable due infrastructure hardening and the ability to avoid extreme demands by the public on cellular and other public networks during a crisis. These systems also provide a backup for emergency responders to use when public access communications become overwhelmed or fail during an event. The crowd-sourced fire cameras can be viewed year round through AlertTahoe and AlertSoCal websites with on-demand time-lapse, an integrated real time lightning map, and other useful features.
Iguacel, Isabel; Michels, Nathalie; Fernández-Alvira, Juan M; Bammann, Karin; De Henauw, Stefaan; Felső, Regina; Gwozdz, Wencke; Hunsberger, Monica; Reisch, Lucia; Russo, Paola; Tornaritis, Michael; Thumann, Barbara Franziska; Veidebaum, Toomas; Börnhorst, Claudia; Moreno, Luis A
2017-09-01
The effect of socioeconomic inequalities on children's mental health remains unclear. This study aims to explore the cross-sectional and longitudinal associations between social vulnerabilities and psychosocial problems, and the association between accumulation of vulnerabilities and psychosocial problems. 5987 children aged 2-9 years from eight European countries were assessed at baseline and 2-year follow-up. Two different instruments were employed to assess children's psychosocial problems: the KINDL (Questionnaire for Measuring Health-Related Quality of Life in Children and Adolescents) was used to evaluate children's well-being and the Strengths and Difficulties Questionnaire (SDQ) was used to evaluate children's internalising problems. Vulnerable groups were defined as follows: children whose parents had minimal social networks, children from non-traditional families, children of migrant origin or children with unemployed parents. Logistic mixed-effects models were used to assess the associations between social vulnerabilities and psychosocial problems. After adjusting for classical socioeconomic and lifestyle indicators, children whose parents had minimal social networks were at greater risk of presenting internalising problems at baseline and follow-up (OR 1.53, 99% CI 1.11-2.11). The highest risk for psychosocial problems was found in children whose status changed from traditional families at T0 to non-traditional families at T1 (OR 1.60, 99% CI 1.07-2.39) and whose parents had minimal social networks at both time points (OR 1.97, 99% CI 1.26-3.08). Children with one or more vulnerabilities accumulated were at a higher risk of developing psychosocial problems at baseline and follow-up. Therefore, policy makers should implement measures to strengthen the social support for parents with a minimal social network.
The Department of Defense energy vulnerabilities: Potential problems and observations
NASA Astrophysics Data System (ADS)
Freiwald, D. A.; Berger, M. E.; Roach, J. F.
1982-08-01
The Department of Defense is almost entirely dependent on civilian energy supplies to meet its needs in both peacetime and periods of heightened conflict. There are a number of potential vulnerabilities to the continual and timely supply of energy to both the civilian and military sectors. These include denial of the energy resources themselves, disruption of critical transportation networks, destruction of storage facilities, and interruption of electrical power. This report briefly reviews the present situation for provision of energy from the civilian sector to the military. General vulnerabilities of the existing energy supply system are identified, along with the potential for armed aggression (including terrorist and sabotage activities) against the energy network. Conclusions and some tentative observations are made as to a proper response to the existing vulnerabilities.
Social Networks, Sexual Networks and HIV Risk in Men Who Have Sex with Men
Amirkhanian, Yuri A.
2014-01-01
Worldwide, men who have sex with men (MSM) remain one of the most HIV-vulnerable community populations. A global public health priority is developing new methods of reaching MSM, understanding HIV transmission patterns, and intervening to reduce their risk. Increased attention is being given to the role that MSM networks play in HIV epidemiology. This review of MSM network research studies demonstrates that: (1) Members of the same social network often share similar norms, attitudes, and HIV risk behavior levels; (2) Network interventions are feasible and powerful for reducing unprotected sex and potentially for increasing HIV testing uptake; (3) HIV vulnerability among African American MSM increases when an individual enters a high-risk sexual network characterized by high density and racial homogeneity; and (4) Networks are primary sources of social support for MSM, particularly for those living with HIV, with greater support predicting higher care uptake and adherence. PMID:24384832
Cybersim: geographic, temporal, and organizational dynamics of malware propagation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Santhi, Nandakishore; Yan, Guanhua; Eidenbenz, Stephan
2010-01-01
Cyber-infractions into a nation's strategic security envelope pose a constant and daunting challenge. We present the modular CyberSim tool which has been developed in response to the need to realistically simulate at a national level, software vulnerabilities and resulting mal ware propagation in online social networks. CyberSim suite (a) can generate realistic scale-free networks from a database of geocoordinated computers to closely model social networks arising from personal and business email contacts and online communities; (b) maintains for each,bost a list of installed software, along with the latest published vulnerabilities; (d) allows designated initial nodes where malware gets introduced; (e)more » simulates, using distributed discrete event-driven technology, the spread of malware exploiting a specific vulnerability, with packet delay and user online behavior models; (f) provides a graphical visualization of spread of infection, its severity, businesses affected etc to the analyst. We present sample simulations on a national level network with millions of computers.« less
Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz
2012-01-01
The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.
Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz
2013-01-01
The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents’ social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population. PMID:21538082
NASA Astrophysics Data System (ADS)
Mohammadi, Hadi
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to create and design a Security and Critical Patch Management Process (SCPMP) framework based on Systems Engineering (SE) principles. This framework will assist Information Technology Department Staff (ITDS) to reduce IT operating time and costs and mitigate the risk of security and vulnerability attacks. Further, this study evaluates implementation of the SCPMP in the networked computing systems of an academic environment in order to: 1. Meet patch management requirements by applying SE principles. 2. Reduce the cost of IT operations and PVM cycles. 3. Improve the current PVM methodologies to prevent networked computing systems from becoming the targets of security vulnerability attacks. 4. Embed a Maintenance Optimization Tool (MOT) in the proposed framework. The MOT allows IT managers to make the most practicable choice of methods for deploying and installing released patches and vulnerability remediation. In recent years, there has been a variety of frameworks for security practices in every networked computing system to protect computer workstations from becoming compromised or vulnerable to security attacks, which can expose important information and critical data. I have developed a new mechanism for implementing PVM for maximizing security-vulnerability maintenance, protecting OS and software packages, and minimizing SCPMP cost. To increase computing system security in any diverse environment, particularly in academia, one must apply SCPMP. I propose an optimal maintenance policy that will allow ITDS to measure and estimate the variation of PVM cycles based on their department's requirements. My results demonstrate that MOT optimizes the process of implementing SCPMP in academic workstations.
Ceschin, Rafael; Lee, Vince K; Schmithorst, Vince; Panigrahy, Ashok
2015-01-01
Preterm born children with spastic diplegia type of cerebral palsy and white matter injury or periventricular leukomalacia (PVL), are known to have motor, visual and cognitive impairments. Most diffusion tensor imaging (DTI) studies performed in this group have demonstrated widespread abnormalities using averaged deterministic tractography and voxel-based DTI measurements. Little is known about structural network correlates of white matter topography and reorganization in preterm cerebral palsy, despite the availability of new therapies and the need for brain imaging biomarkers. Here, we combined novel post-processing methodology of probabilistic tractography data in this preterm cohort to improve spatial and regional delineation of longitudinal cortical association tract abnormalities using an along-tract approach, and compared these data to structural DTI cortical network topology analysis. DTI images were acquired on 16 preterm children with cerebral palsy (mean age 5.6 ± 4) and 75 healthy controls (mean age 5.7 ± 3.4). Despite mean tract analysis, Tract-Based Spatial Statistics (TBSS) and voxel-based morphometry (VBM) demonstrating diffusely reduced fractional anisotropy (FA) reduction in all white matter tracts, the along-tract analysis improved the detection of regional tract vulnerability. The along-tract map-structural network topology correlates revealed two associations: (1) reduced regional posterior-anterior gradient in FA of the longitudinal visual cortical association tracts (inferior fronto-occipital fasciculus, inferior longitudinal fasciculus, optic radiation, posterior thalamic radiation) correlated with reduced posterior-anterior gradient of intra-regional (nodal efficiency) metrics with relative sparing of frontal and temporal regions; and (2) reduced regional FA within frontal-thalamic-striatal white matter pathways (anterior limb/anterior thalamic radiation, superior longitudinal fasciculus and cortical spinal tract) correlated with alteration in eigenvector centrality, clustering coefficient (inter-regional) and participation co-efficient (inter-modular) alterations of frontal-striatal and fronto-limbic nodes suggesting re-organization of these pathways. Both along tract and structural topology network measurements correlated strongly with motor and visual clinical outcome scores. This study shows the value of combining along-tract analysis and structural network topology in depicting not only selective parietal occipital regional vulnerability but also reorganization of frontal-striatal and frontal-limbic pathways in preterm children with cerebral palsy. These finding also support the concept that widespread, but selective posterior-anterior neural network connectivity alterations in preterm children with cerebral palsy likely contribute to the pathogenesis of neurosensory and cognitive impairment in this group.
Personal networks of women in residential and outpatient substance abuse treatment
Kim, HyunSoo; Tracy, Elizabeth; Brown, Suzanne; Jun, MinKyoung; Park, Hyunyong; Min, Meeyoung; McCarty, Chris
2015-01-01
This study compared compositional, social support, and structural characteristics of personal networks among women in residential (RT) and intensive outpatient (IOP) substance abuse treatment. The study sample included 377 women from inner-city substance use disorder treatment facilities. Respondents were asked about 25 personal network members known within the past 6 months, characteristics of each (relationship, substance use, types of support), and relationships between each network member. Differences between RT women and IOP women in personal network characteristics were identified using Chi-square and t-tests. Compared to IOP women, RT women had more substance users in their networks, more network members with whom they had used substances and fewer network members who provided social support. These findings suggest that women in residential treatment have specific network characteristics, not experienced by women in IOP, which may make them more vulnerable to relapse; they may therefore require interventions that target these specific network characteristics in order to reduce their vulnerability to relapse. PMID:27011762
Personal networks of women in residential and outpatient substance abuse treatment.
Kim, HyunSoo; Tracy, Elizabeth; Brown, Suzanne; Jun, MinKyoung; Park, Hyunyong; Min, Meeyoung; McCarty, Chris
This study compared compositional, social support, and structural characteristics of personal networks among women in residential (RT) and intensive outpatient (IOP) substance abuse treatment. The study sample included 377 women from inner-city substance use disorder treatment facilities. Respondents were asked about 25 personal network members known within the past 6 months, characteristics of each (relationship, substance use, types of support), and relationships between each network member. Differences between RT women and IOP women in personal network characteristics were identified using Chi-square and t -tests. Compared to IOP women, RT women had more substance users in their networks, more network members with whom they had used substances and fewer network members who provided social support. These findings suggest that women in residential treatment have specific network characteristics, not experienced by women in IOP, which may make them more vulnerable to relapse; they may therefore require interventions that target these specific network characteristics in order to reduce their vulnerability to relapse.
NASA Astrophysics Data System (ADS)
Meyer, Nele Kristin; Schwanghart, Wolfgang; Korup, Oliver
2014-05-01
Norwegian's road network is frequently affected by debris flows. Both damage repair and traffic interruption generate high economic losses and necessitate a rigorous assessment of where losses are expected to be high and where preventive measures should be focused on. In recent studies, we have developed susceptibility and trigger probability maps that serve as input into a hazard calculation at the scale of first-order watersheds. Here we combine these results with graph theory to assess the impact of debris flows on the road network of southern Norway. Susceptibility and trigger probability are aggregated for individual road sections to form a reliability index that relates to the failure probability of a link that connects two network vertices, e.g., road junctions. We define link vulnerability as a function of traffic volume and additional link failure distance. Additional link failure distance is the extra length of the alternative path connecting the two associated link vertices in case the network link fails and is calculated by a shortest-path algorithm. The product of network reliability and vulnerability indices represent the risk index. High risk indices identify critical links for the Norwegian road network and are investigated in more detail. Scenarios demonstrating the impact of single or multiple debris flow events are run for the most important routes between seven large cities in southern Norway. First results show that the reliability of the road network is lowest in the central and north-western part of the study area. Road network vulnerability is highest in the mountainous regions in central southern Norway where the road density is low and in the vicinity of cities where the traffic volume is large. The scenarios indicate that city connections that have their shortest path via routes crossing the central part of the study area have the highest risk of route failure.
Assessment of Critical Events Corridors through Multivariate Cascading Outages Analysis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Makarov, Yuri V.; Samaan, Nader A.; Diao, Ruisheng
2011-10-17
Massive blackouts of electrical power systems in North America over the past decade has focused increasing attention upon ways to identify and simulate network events that may potentially lead to widespread network collapse. This paper summarizes a method to simulate power-system vulnerability to cascading failures to a supplied set of initiating events synonymously termed as Extreme Events. The implemented simulation method is currently confined to simulating steady state power-system response to a set of extreme events. The outlined method of simulation is meant to augment and provide a new insight into bulk power transmission network planning that at present remainsmore » mainly confined to maintaining power system security for single and double component outages under a number of projected future network operating conditions. Although one of the aims of this paper is to demonstrate the feasibility of simulating network vulnerability to cascading outages, a more important goal has been to determine vulnerable parts of the network that may potentially be strengthened in practice so as to mitigate system susceptibility to cascading failures. This paper proposes to demonstrate a systematic approach to analyze extreme events and identify vulnerable system elements that may be contributing to cascading outages. The hypothesis of critical events corridors is proposed to represent repeating sequential outages that can occur in the system for multiple initiating events. The new concept helps to identify system reinforcements that planners could engineer in order to 'break' the critical events sequences and therefore lessen the likelihood of cascading outages. This hypothesis has been successfully validated with a California power system model.« less
Individual Day-to-Day Process of Social Anxiety in Vulnerable College Students
ERIC Educational Resources Information Center
Campbell, Cynthia G.; Bierman, Karen L.; Molenaar, Peter C. M.
2016-01-01
Transitions requiring the creation of new social networks may be challenging for individuals vulnerable to social anxiety, which may hinder successful adjustment. Using person-specific methodology, this study examined social anxiety in vulnerable university freshman away from home during their first semester of college to understand how day-to-day…
NASA Astrophysics Data System (ADS)
Shin, K. H.; Kim, K. H.; Ki, S. J.; Lee, H. G.
2017-12-01
The vulnerability assessment tool at a Tier 1 level, although not often used for regulatory purposes, helps establish pollution prevention and management strategies in the areas of potential environmental concern such as soil and ground water. In this study, the Neural Network Pattern Recognition Tool embedded in MATLAB was used to allow the initial screening of soil and groundwater pollution based on data compiled across about 1000 previously contaminated sites in Korea. The input variables included a series of parameters which were tightly related to downward movement of water and contaminants through soil and ground water, whereas multiple classes were assigned to the sum of concentrations of major pollutants detected. Results showed that in accordance with diverse pollution indices for soil and ground water, pollution levels in both media were strongly modulated by site-specific characteristics such as intrinsic soil and other geologic properties, in addition to pollution sources and rainfall. However, classification accuracy was very sensitive to the number of classes defined as well as the types of the variables incorporated, requiring careful selection of input variables and output categories. Therefore, we believe that the proposed methodology is used not only to modify existing pollution indices so that they are more suitable for addressing local vulnerability, but also to develop a unique assessment tool to support decision making based on locally or nationally available data. This study was funded by a grant from the GAIA project(2016000560002), Korea Environmental Industry & Technology Institute, Republic of Korea.
Evolving bipartite authentication graph partitions
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
2017-01-16
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Evolving bipartite authentication graph partitions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pope, Aaron Scott; Tauritz, Daniel Remy; Kent, Alexander D.
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance between user convenience and user access control is an increasingly challenging proposition. Suboptimal partitioning of users’ access and available services contributes to the vulnerability of enterprise networks. Previous edge-cut partitioning methods unduly restrict users’ access to network resources. This paper introduces a novel method of network partitioning superior to the current state-of-the-art which minimizes user impact by providing alternate avenues for access that reduce vulnerability. Networks are modeled as bipartite authentication access graphs and a multi-objective evolutionary algorithm is used to simultaneously minimize the size of largemore » connected components while minimizing overall restrictions on network users. Lastly, results are presented on a real world data set that demonstrate the effectiveness of the introduced method compared to previous naive methods.« less
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
Dynamics of subway networks based on vehicles operation timetable
NASA Astrophysics Data System (ADS)
Xiao, Xue-mei; Jia, Li-min; Wang, Yan-hui
2017-05-01
In this paper, a subway network is represented as a dynamic, directed and weighted graph, in which vertices represent subway stations and weights of edges represent the number of vehicles passing through the edges by considering vehicles operation timetable. Meanwhile the definitions of static and dynamic metrics which can represent vertices' and edges' local and global attributes are proposed. Based on the model and metrics, standard deviation is further introduced to study the dynamic properties (heterogeneity and vulnerability) of subway networks. Through a detailed analysis of the Beijing subway network, we conclude that with the existing network structure, the heterogeneity and vulnerability of the Beijing subway network varies over time when the vehicle operation timetable is taken into consideration, and the distribution of edge weights affects the performance of the network. In other words, although the vehicles operation timetable is restrained by the physical structure of the network, it determines the performances and properties of the Beijing subway network.
Anomaly-based intrusion detection for SCADA systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, D.; Usynin, A.; Hines, J. W.
2006-07-01
Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper willmore » briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)« less
User Vulnerability and its Reduction on a Social Networking Site
2014-01-01
social networking sites bring about new...and explore other users’ profiles and friend networks. Social networking sites have reshaped business models [Vayner- chuk 2009], provided platform... social networking sites is to enable users to be more social, user privacy and security issues cannot be ignored. On one hand, most social networking sites
Robustness of Synchrony in Complex Networks and Generalized Kirchhoff Indices
NASA Astrophysics Data System (ADS)
Tyloo, M.; Coletta, T.; Jacquod, Ph.
2018-02-01
In network theory, a question of prime importance is how to assess network vulnerability in a fast and reliable manner. With this issue in mind, we investigate the response to external perturbations of coupled dynamical systems on complex networks. We find that for specific, nonaveraged perturbations, the response of synchronous states depends on the eigenvalues of the stability matrix of the unperturbed dynamics, as well as on its eigenmodes via their overlap with the perturbation vector. Once averaged over properly defined ensembles of perturbations, the response is given by new graph topological indices, which we introduce as generalized Kirchhoff indices. These findings allow for a fast and reliable method for assessing the specific or average vulnerability of a network against changing operational conditions, faults, or external attacks.
Vulnerability of countries to food-production crises propagating in the virtual water trade network
NASA Astrophysics Data System (ADS)
Tamea, S.; Laio, F.; Ridolfi, L.
2015-12-01
In recent years, the international trade of food and agricultural commodities has undergone a marked increase of exchanged volumes and an expansion of the trade network. This globalization of trade has both positive and negative effects, but the interconnectedness and external dependency of countries generate complex dynamics which are often difficult to understand and model. In this study we consider the volume of water used for the production of agricultural commodities, virtually exchanged among countries through commodity trade, i.e. the virtual water trade. Then, we set up a parsimonious mechanistic model describing the propagation, into the global trade network, of food-production crises generated locally by a social, economic or environmental event (such as war, economic crisis, drought, pest). The model, accounting for the network structure and the virtual water balance of all countries, bases on rules derived from observed virtual water flows and on data-based and statistically verified assumption. It is also tested on real case studies that prove its capability to capture the main features of crises propagation. The model is then employed as the basis for the development of an index of country vulnerability, measuring the exposure of countries to crises propagating in the virtual water trade network. Results of the analysis are discussed within the context of socio-economic and environmental conditions of countries, showing that not only water-scarce, but also wealthy and globalized countries, are among the most vulnerable to external crises. The temporal analysis for the period 1986-2011 reveals that the global average vulnerability has strongly increased over time, confirming the increased exposure of countries to external crises which may occur in the virtual water trade network.
Configuration development for ROMENET
NASA Astrophysics Data System (ADS)
Rhue, Lawrence
1989-10-01
A plan prepared by RJO Enterprises and BBN Communications Corporation (BBNCC) for the design of ROMENET, a DDN-like testbed for the Rome Air Development Center (RADC) Wide Area Networks (WAN) laboratory is presented. The ROMENET is intended to provide RADC with the ability to test and evaluate the performance and vulnerability of the Defense Data Network (DDN) technologies in support of specific Major Command programs and activities at RADC. It will also support experimentation with packet switched network technologies and includes facilities to analytically evaluate the performance of the network and its associated equipment and media. In addition, ROMENET will provide a simulation vehicle for controlled interference or jamming into the media for vulnerability assessment. Through interfaces with the RADC Battle Management Laboratory (BML), ROMENET will allow the Air Force to assess the restorative and performance characteristics of the network under stressed conditions. The closed environment of ROMENET makes it ideal for creating and testing routing algorithms and network control protocols.
NASA Astrophysics Data System (ADS)
Wang, Xiao Juan; Guo, Shi Ze; Jin, Lei; Chen, Mo
We study the structural robustness of the scale free network against the cascading failure induced by overload. In this paper, a failure mechanism based on betweenness-degree ratio distribution is proposed. In the cascading failure model we built the initial load of an edge which is proportional to the node betweenness of its ends. During the edge random deletion, we find a phase transition. Then based on the phase transition, we divide the process of the cascading failure into two parts: the robust area and the vulnerable area, and define the corresponding indicator to measure the performance of the networks in both areas. From derivation, we find that the vulnerability of the network is determined by the distribution of betweenness-degree ratio. After that we use the connection between the node ability coefficient and distribution of betweenness-degree ratio to explain the cascading failure mechanism. In simulations, we verify the correctness of our derivations. By changing connecting preferences, we find scale free networks with a slight assortativity, which performs better both in robust area and vulnerable area.
Advances in molecular-based diagnostics in meeting crop biosecurity and phytosanitary issues.
Schaad, Norman W; Frederick, Reid D; Shaw, Joe; Schneider, William L; Hickson, Robert; Petrillo, Michael D; Luster, Douglas G
2003-01-01
Awareness of crop biosecurity and phytosanitation has been heightened since 9/11 and the unresolved anthrax releases in October 2001. Crops are highly vulnerable to accidental or deliberate introductions of crop pathogens from outside U.S. borders. Strategic thinking about protection against deliberate or accidental release of a plant pathogen is an urgent priority. Rapid detection will be the key to success. This review summarizes recent progress in the development of rapid real-time PCR protocols and evaluates their effectiveness in a proposed nationwide network of diagnostic laboratories that will facilitate rapid diagnostics and improved communication.
ERIC Educational Resources Information Center
Bele, Irene Velsvik; Kvalsund, Rune
2016-01-01
This longitudinal study, spanning from 1995 through 2012, followed vulnerable youth from upper secondary school (T1) as they made the transition to their early twenties (T2), late twenties (T3) and mid-thirties (T4). We investigated their social network relationships in different phases of adult life, focusing mainly on factors that explain…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jackson, K.A.; Neuman, M.C.; Simmonds, D.D.
An effective method for detecting computer misuse is the automatic monitoring and analysis of on-line user activity. This activity is reflected in the system audit record, in the system vulnerability posture, and in other evidence found through active testing of the system. During the last several years we have implemented an automatic misuse detection system at Los Alamos. This is the Network Anomaly Detection and Intrusion Reporter (NADIR). We are currently expanding NADIR to include processing of the Cray UNICOS operating system. This new component is called the UNICOS Realtime NADIR, or UNICORN. UNICORN summarizes user activity and system configurationmore » in statistical profiles. It compares these profiles to expert rules that define security policy and improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. The first phase of UNICORN development is nearing completion, and will be operational in late 1994.« less
Network Vulnerability Assessment of the U.S. Crude Pipeline Infrastructure
2012-09-01
56 Clanton, “Oklahoma Oil Hub Helps Keep Oil Prices from Going Higher.” 57 Donald Furgeson, John Mahoney , and Brett Warfield...Vulnerability Assessment Matrix of the COTH.58 58 Furgeson, Mahoney , and Warfield, Security...Steinhäusler et al., “Security Risks to the Oil and Gas Industry: Terrorist Capabilities.” 71 Furgeson, Mahoney , and Warfield, Security Vulnerability
Crea, Thomas M.; Lombe, Margaret; Robertson, Laura A.; Dumba, Lovemore; Mushati, Phyllis; Makoni, J.C.; Mavise, Gideon; Eaton, Jeffrey W.; Munatsi, Brighton; Nyamukapa, Constance A.; Gregson, Simon
2012-01-01
The high prevalence of human immunodeficiency virus/acquired immune deficiency syndrome in sub-Saharan Africa has resulted in a dramatic increase in orphans and vulnerable children (OVC) over the past decade. These children typically rely on extended family networks for support, but the magnitude of the crisis has resulted in traditional familial networks becoming overwhelmed and more economically and socially vulnerable. Previous research consistently demonstrates the positive influence of household asset ownership on children's well-being. Using data from impoverished households caring for OVC in rural Manicaland Province, Zimbabwe, this study explores the influence of household asset ownership on OVC health vulnerability (HV) and social vulnerability (SV). Findings indicate that asset ownership is associated with significantly lower SV, in terms of school attendance and birth registration. Yet, assets do not emerge as a direct influence of OVC HV as measured by disease and chronic illness, although having a chronically ill adult in the household increases HV. These findings suggest that asset ownership, specifically a combination of fixed and movable assets, may offset the influence of other risk factors for children's SV. PMID:22624868
Crea, Thomas M; Lombe, Margaret; Robertson, Laura A; Dumba, Lovemore; Mushati, Phyllis; Makoni, J C; Mavise, Gideon; Eaton, Jeffrey W; Munatsi, Brighton; Nyamukapa, Constance A; Gregson, Simon
2013-01-01
The high prevalence of human immunodeficiency virus/acquired immune deficiency syndrome in sub-Saharan Africa has resulted in a dramatic increase in orphans and vulnerable children (OVC) over the past decade. These children typically rely on extended family networks for support, but the magnitude of the crisis has resulted in traditional familial networks becoming overwhelmed and more economically and socially vulnerable. Previous research consistently demonstrates the positive influence of household asset ownership on children's well-being. Using data from impoverished households caring for OVC in rural Manicaland Province, Zimbabwe, this study explores the influence of household asset ownership on OVC health vulnerability (HV) and social vulnerability (SV). Findings indicate that asset ownership is associated with significantly lower SV, in terms of school attendance and birth registration. Yet, assets do not emerge as a direct influence of OVC HV as measured by disease and chronic illness, although having a chronically ill adult in the household increases HV. These findings suggest that asset ownership, specifically a combination of fixed and movable assets, may offset the influence of other risk factors for children's SV.
A scoring mechanism for the rank aggregation of network robustness
NASA Astrophysics Data System (ADS)
Yazdani, Alireza; Dueñas-Osorio, Leonardo; Li, Qilin
2013-10-01
To date, a number of metrics have been proposed to quantify inherent robustness of network topology against failures. However, each single metric usually only offers a limited view of network vulnerability to different types of random failures and targeted attacks. When applied to certain network configurations, different metrics rank network topology robustness in different orders which is rather inconsistent, and no single metric fully characterizes network robustness against different modes of failure. To overcome such inconsistency, this work proposes a multi-metric approach as the basis of evaluating aggregate ranking of network topology robustness. This is based on simultaneous utilization of a minimal set of distinct robustness metrics that are standardized so to give way to a direct comparison of vulnerability across networks with different sizes and configurations, hence leading to an initial scoring of inherent topology robustness. Subsequently, based on the inputs of initial scoring a rank aggregation method is employed to allocate an overall ranking of robustness to each network topology. A discussion is presented in support of the presented multi-metric approach and its applications to more realistically assess and rank network topology robustness.
Comparative study on the freeze stability of yeast and chemical leavened steamed bread dough.
Wang, Pei; Yang, Runqiang; Gu, Zhenxin; Xu, Xueming; Jin, Zhengyu
2017-04-15
The present study comparatively evaluated the evolution of yeast and chemical leavened steamed bread dough (YLD/CLD) quality during freeze/thaw (FT) cycles. The steamed bread quality of CLD was more freeze-stable than that of the YLD after 3 FT cycles. Decreased yeast viability contributed to the loss of gassing power in YLD while no significant differences were observed for CLD during FT cycles. However, faster gas release rate in frozen CLD indicated gas retention loss due to the distortion of gluten network. Glutenin macropolymers (GMP) depolymerization via breakage of inter-chain disulfide (SS) bonds and conversions of α-helix and β-turn to β-sheet structures were the main indicators of gluten deterioration. Gluten network was more vulnerable in frozen YLD, resulting in detectable loss of viscoelasticity. The results suggested that supplement of chemical leavener contributed to a more freeze-tolerant gluten network besides its stable gassing power. Copyright © 2016 Elsevier Ltd. All rights reserved.
An Optimal Method for Detecting Internal and External Intrusion in MANET
NASA Astrophysics Data System (ADS)
Rafsanjani, Marjan Kuchaki; Aliahmadipour, Laya; Javidi, Mohammad M.
Mobile Ad hoc Network (MANET) is formed by a set of mobile hosts which communicate among themselves through radio waves. The hosts establish infrastructure and cooperate to forward data in a multi-hop fashion without a central administration. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions. In this paper, we proposed a method for prevention internal intruder and detection external intruder by using game theory in mobile ad hoc network. One optimal solution for reducing the resource consumption of detection external intruder is to elect a leader for each cluster to provide intrusion service to other nodes in the its cluster, we call this mode moderate mode. Moderate mode is only suitable when the probability of attack is low. Once the probability of attack is high, victim nodes should launch their own IDS to detect and thwart intrusions and we call robust mode. In this paper leader should not be malicious or selfish node and must detect external intrusion in its cluster with minimum cost. Our proposed method has three steps: the first step building trust relationship between nodes and estimation trust value for each node to prevent internal intrusion. In the second step we propose an optimal method for leader election by using trust value; and in the third step, finding the threshold value for notifying the victim node to launch its IDS once the probability of attack exceeds that value. In first and third step we apply Bayesian game theory. Our method due to using game theory, trust value and honest leader can effectively improve the network security, performance and reduce resource consumption.
NASA Astrophysics Data System (ADS)
Rastegar, A.
2017-09-01
Great earthquakes cause huge damages to human life. Street networks vulnerability makes the rescue operation to encounter serious difficulties especially at the first 72 hours after the incident. Today, physical expansion and high density of great cities, due to narrow access roads, large distance from medical care centers and location at areas with high seismic risk, will lead to a perilous and unpredictable situation in case of the earthquake. Zone # 6 of Tehran, with 229,980 population (3.6% of city population) and 20 km2 area (3.2% of city area), is one of the main municipal zones of Tehran (Iran center of statistics, 2006). Major land-uses, like ministries, embassies, universities, general hospitals and medical centers, big financial firms and so on, manifest the high importance of this region on local and national scale. In this paper, by employing indexes such as access to medical centers, street inclusion, building and population density, land-use, PGA and building quality, vulnerability degree of street networks in zone #6 against the earthquake is calculated through overlaying maps and data in combination with IHWP method and GIS. This article concludes that buildings alongside the streets with high population and building density, low building quality, far to rescue centers and high level of inclusion represent high rate of vulnerability, compared with other buildings. Also, by moving on from north to south of the zone, the vulnerability increases. Likewise, highways and streets with substantial width and low building and population density hold little values of vulnerability.
Wei, Xiaoyan; Liu, Xuejun; Cheng, Liang; Sun, Lele; Pan, Yingying; Zong, Wenwen
2017-11-28
Southwest China is home to more than 30 ethnic minority groups. Since most of these populations reside in mountainous areas, convenient access to medical services is an important metric of how well their livelihoods are being protected. This paper proposes a medical convenience index (MCI) and computation model for mountain residents, taking into account various conditions including topography, geology, and climate. Data on road networks were used for comprehensive evaluation from three perspectives: vulnerability, complexity, and accessibility. The model is innovative for considering road network vulnerability in mountainous areas, and proposing a method of evaluating road network vulnerability by measuring the impacts of debris flows based on only links. The model was used to compute and rank the respective MCIs for settlements of each ethnic population in the Dehong Dai and Jingpo Autonomous Prefecture of Yunnan Province, in 2009 and 2015. Data on the settlements over the two periods were also used to analyze the spatial differentiation of medical convenience levels within the study area. The medical convenience levels of many settlements improved significantly. 80 settlements were greatly improved, while another 103 showed slight improvement.Areas with obvious improvement were distributed in clusters, and mainly located in the southwestern part of Yingjiang County, northern Longchuan County, eastern Lianghe County, and the region where Lianghe and Longchuan counties and Mang City intersect. Development of the road network was found to be a major contributor to improvements in MCI for mountain residents over the six-year period.
DOT National Transportation Integrated Search
2017-04-30
Coastal communities are vulnerable to disruptions in their fuel distribution networks due to : tropical storms, hurricanes and associated flooding. These disruptions impact communities by : limiting fueling in the days following the storm potentially...
Painter, Thomas M
2018-01-01
Hispanic/Latino migrants and immigrants are vulnerable to infection by HIV and other sexually transmitted diseases (STDs). Participation in social support networks helps them cope with circumstances in the U.S. Studies of Hispanic/Latino migrants suggest that participation may also be protective against HIV/STD infection. However the studies do not satisfactorily explain how participation leads to protective actions, and recommend externally-induced interventions for HIV/STD prevention rather than incorporating the spontaneously occurring forms of social support they describe. Given the potential protective effects of support networks, a database search was conducted to ascertain the extent to which published HIV/STD prevention interventions for these populations incorporate their support networks. Very few interventions were identified and fewer still incorporate support networks. This commentary calls for research to understand more fully how support networks affect HIV/STD risks among Hispanic/Latino migrants and immigrants and identifies potential benefits of incorporating these networks in HIV/STD prevention for these vulnerable populations.
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
Cyber threat model for tactical radio networks
NASA Astrophysics Data System (ADS)
Kurdziel, Michael T.
2014-05-01
The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.
Robustness and Vulnerability of Networks with Dynamical Dependency Groups.
Bai, Ya-Nan; Huang, Ning; Wang, Lei; Wu, Zhi-Xi
2016-11-28
The dependency property and self-recovery of failure nodes both have great effects on the robustness of networks during the cascading process. Existing investigations focused mainly on the failure mechanism of static dependency groups without considering the time-dependency of interdependent nodes and the recovery mechanism in reality. In this study, we present an evolving network model consisting of failure mechanisms and a recovery mechanism to explore network robustness, where the dependency relations among nodes vary over time. Based on generating function techniques, we provide an analytical framework for random networks with arbitrary degree distribution. In particular, we theoretically find that an abrupt percolation transition exists corresponding to the dynamical dependency groups for a wide range of topologies after initial random removal. Moreover, when the abrupt transition point is above the failure threshold of dependency groups, the evolving network with the larger dependency groups is more vulnerable; when below it, the larger dependency groups make the network more robust. Numerical simulations employing the Erdős-Rényi network and Barabási-Albert scale free network are performed to validate our theoretical results.
Including Internet insurance as part of a hospital computer network security plan.
Riccardi, Ken
2002-01-01
Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities.
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment
NASA Technical Reports Server (NTRS)
Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda
2013-01-01
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.
KREAGER, PHILIP
2007-01-01
Contemporary trends in population ageing and urbanisation in the developing world imply that the extensive out-migration of young people from rural areas coincides with, and is likely to exacerbate, a rise in the older share of the rural population. This paper examines the impact of migration on vulnerability at older ages by drawing on the results of anthropological and demographic field studies in three Indonesian communities. The methodology for identifying vulnerable older people has a progressively sharper focus, beginning first with important differences between the communities, then examining variations by socio-economic strata, and finally the variability of older people's family networks. Comparative analysis indicates considerable heterogeneity in past and present migration patterns, both within and between villages. The migrants' contributions are a normal and important component of older people's support, often in combination with those of local family members. Higher status families are commonly able to reinforce their position by making better use of migration opportunities than the less advantaged. Although family networks in the poorer strata may effect some redistribution of the children's incomes, their social networks are smaller and insufficient to overcome their marked disadvantages. Vulnerability thus arises where several factors, including migration histories, result in unusually small networks, and when the migrations are within rural areas. PMID:23750063
Aging and functional brain networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tomasi D.; Tomasi, D.; Volkow, N.D.
2011-07-11
Aging is associated with changes in human brain anatomy and function and cognitive decline. Recent studies suggest the aging decline of major functional connectivity hubs in the 'default-mode' network (DMN). Aging effects on other networks, however, are largely unknown. We hypothesized that aging would be associated with a decline of short- and long-range functional connectivity density (FCD) hubs in the DMN. To test this hypothesis, we evaluated resting-state data sets corresponding to 913 healthy subjects from a public magnetic resonance imaging database using functional connectivity density mapping (FCDM), a voxelwise and data-driven approach, together with parallel computing. Aging was associatedmore » with pronounced long-range FCD decreases in DMN and dorsal attention network (DAN) and with increases in somatosensory and subcortical networks. Aging effects in these networks were stronger for long-range than for short-range FCD and were also detected at the level of the main functional hubs. Females had higher short- and long-range FCD in DMN and lower FCD in the somatosensory network than males, but the gender by age interaction effects were not significant for any of the networks or hubs. These findings suggest that long-range connections may be more vulnerable to aging effects than short-range connections and that, in addition to the DMN, the DAN is also sensitive to aging effects, which could underlie the deterioration of attention processes that occurs with aging.« less
Waksman, Ron; Torguson, Rebecca; Spad, Mia-Ashley; Garcia-Garcia, Hector; Ware, James; Wang, Rui; Madden, Sean; Shah, Priti; Muller, James
2017-10-01
It has been hypothesized that the outcome post-PCI could be improved by the detection and subsequent treatment of vulnerable patients and lipid-rich vulnerable coronary plaques (LRP). A near-infrared spectroscopy (NIRS) catheter capable of detecting LRP is being evaluated in The Lipid-Rich Plaque Study. The LRP Study is an international, multicenter, prospective cohort study conducted in patients with suspected coronary artery disease (CAD) who underwent cardiac catheterization with possible ad hoc PCI for an index event. Patient level and plaque level events were detected by follow-up in the subsequent 2 years. Enrollment began in February 2014 and was completed in March 2016; a total of 1,562 patients were enrolled. Adjudication of new coronary event occurrence and de novo culprit lesion location during the 2-year follow-up is performed by an independent clinical end-points committee (CEC) blinded to NIRS-IVUS findings. The first analysis of the results will be performed when at least 20 de novo events have occurred for which follow-up angiographic data and baseline NIRS-IVUS measurements are available. It is expected that results of the study will be announced in 2018. The LRP Study will test the hypotheses that NIRS-IVUS imaging to detect LRP in patients can identify vulnerable patients and vulnerable plaques. Identification of vulnerable patients will assist future studies of novel systemic therapies; identification of localized vulnerable plaques would enhance future studies of possible preventive measures. Copyright © 2017 Elsevier Inc. All rights reserved.
Error and attack tolerance of complex networks
NASA Astrophysics Data System (ADS)
Albert, Réka; Jeong, Hawoong; Barabási, Albert-László
2000-07-01
Many complex systems display a surprising degree of tolerance against errors. For example, relatively simple organisms grow, persist and reproduce despite drastic pharmaceutical or environmental interventions, an error tolerance attributed to the robustness of the underlying metabolic network. Complex communication networks display a surprising degree of robustness: although key components regularly malfunction, local failures rarely lead to the loss of the global information-carrying ability of the network. The stability of these and other complex systems is often attributed to the redundant wiring of the functional web defined by the systems' components. Here we demonstrate that error tolerance is not shared by all redundant systems: it is displayed only by a class of inhomogeneously wired networks, called scale-free networks, which include the World-Wide Web, the Internet, social networks and cells. We find that such networks display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates. However, error tolerance comes at a high price in that these networks are extremely vulnerable to attacks (that is, to the selection and removal of a few nodes that play a vital role in maintaining the network's connectivity). Such error tolerance and attack vulnerability are generic properties of communication networks.
A prototype forensic toolkit for industrial-control-systems incident response
NASA Astrophysics Data System (ADS)
Carr, Nickolas B.; Rowe, Neil C.
2015-05-01
Industrial control systems (ICSs) are an important part of critical infrastructure in cyberspace. They are especially vulnerable to cyber-attacks because of their legacy hardware and software and the difficulty of changing it. We first survey the history of intrusions into ICSs, the more serious of which involved a continuing adversary presence on an ICS network. We discuss some common vulnerabilities and the categories of possible attacks, noting the frequent use of software written a long time ago. We propose a framework for designing ICS incident response under the constraints that no new software must be required and that interventions cannot impede the continuous processing that is the norm for such systems. We then discuss a prototype toolkit we built using the Windows Management Instrumentation Command-Line tool for host-based analysis and the Bro intrusion-detection software for network-based analysis. Particularly useful techniques we used were learning the historical range of parameters of numeric quantities so as to recognize anomalies, learning the usual addresses of connections to a node, observing Internet addresses (usually rare), observing anomalous network protocols such as unencrypted data transfers, observing unusual scheduled tasks, and comparing key files through registry entries and hash values to find malicious modifications. We tested our methods on actual data from ICSs including publicly-available data, voluntarily-submitted data, and researcher-provided "advanced persistent threat" data. We found instances of interesting behavior in our experiments. Intrusions were generally easy to see because of the repetitive nature of most processing on ICSs, but operators need to be motivated to look.
On-line detection of Escherichia coli intrusion in a pilot-scale drinking water distribution system.
Ikonen, Jenni; Pitkänen, Tarja; Kosse, Pascal; Ciszek, Robert; Kolehmainen, Mikko; Miettinen, Ilkka T
2017-08-01
Improvements in microbial drinking water quality monitoring are needed for the better control of drinking water distribution systems and for public health protection. Conventional water quality monitoring programmes are not always able to detect a microbial contamination of drinking water. In the drinking water production chain, in addition to the vulnerability of source waters, the distribution networks are prone to contamination. In this study, a pilot-scale drinking-water distribution network with an on-line monitoring system was utilized for detecting bacterial intrusion. During the experimental Escherichia coli intrusions, the contaminant was measured by applying a set of on-line sensors for electric conductivity (EC), pH, temperature (T), turbidity, UV-absorbance at 254 nm (UVAS SC) and with a device for particle counting. Monitored parameters were compared with the measured E. coli counts using the integral calculations of the detected peaks. EC measurement gave the strongest signal compared with the measured baseline during the E. coli intrusion. Integral calculations showed that the peaks in the EC, pH, T, turbidity and UVAS SC data were detected corresponding to the time predicted. However, the pH and temperature peaks detected were barely above the measured baseline and could easily be mixed with the background noise. The results indicate that on-line monitoring can be utilized for the rapid detection of microbial contaminants in the drinking water distribution system although the peak interpretation has to be performed carefully to avoid being mixed up with normal variations in the measurement data. Copyright © 2017 Elsevier Ltd. All rights reserved.
Beyond network structure: How heterogeneous susceptibility modulates the spread of epidemics.
Smilkov, Daniel; Hidalgo, Cesar A; Kocarev, Ljupco
2014-04-25
The compartmental models used to study epidemic spreading often assume the same susceptibility for all individuals, and are therefore, agnostic about the effects that differences in susceptibility can have on epidemic spreading. Here we show that-for the SIS model-differential susceptibility can make networks more vulnerable to the spread of diseases when the correlation between a node's degree and susceptibility are positive, and less vulnerable when this correlation is negative. Moreover, we show that networks become more likely to contain a pocket of infection when individuals are more likely to connect with others that have similar susceptibility (the network is segregated). These results show that the failure to include differential susceptibility to epidemic models can lead to a systematic over/under estimation of fundamental epidemic parameters when the structure of the networks is not independent from the susceptibility of the nodes or when there are correlations between the susceptibility of connected individuals.
Beyond network structure: How heterogeneous susceptibility modulates the spread of epidemics
Smilkov, Daniel; Hidalgo, Cesar A.; Kocarev, Ljupco
2014-01-01
The compartmental models used to study epidemic spreading often assume the same susceptibility for all individuals, and are therefore, agnostic about the effects that differences in susceptibility can have on epidemic spreading. Here we show that–for the SIS model–differential susceptibility can make networks more vulnerable to the spread of diseases when the correlation between a node's degree and susceptibility are positive, and less vulnerable when this correlation is negative. Moreover, we show that networks become more likely to contain a pocket of infection when individuals are more likely to connect with others that have similar susceptibility (the network is segregated). These results show that the failure to include differential susceptibility to epidemic models can lead to a systematic over/under estimation of fundamental epidemic parameters when the structure of the networks is not independent from the susceptibility of the nodes or when there are correlations between the susceptibility of connected individuals. PMID:24762621
Sun, Delin; Haswell, Courtney C; Morey, Rajendra A; De Bellis, Michael D
2018-04-10
Child maltreatment is a major cause of pediatric posttraumatic stress disorder (PTSD). Previous studies have not investigated potential differences in network architecture in maltreated youth with PTSD and those resilient to PTSD. High-resolution magnetic resonance imaging brain scans at 3 T were completed in maltreated youth with PTSD (n = 31), without PTSD (n = 32), and nonmaltreated controls (n = 57). Structural covariance network architecture was derived from between-subject intraregional correlations in measures of cortical thickness in 148 cortical regions (nodes). Interregional positive partial correlations controlling for demographic variables were assessed, and those correlations that exceeded specified thresholds constituted connections in cortical brain networks. Four measures of network centrality characterized topology, and the importance of cortical regions (nodes) within the network architecture were calculated for each group. Permutation testing and principle component analysis method were employed to calculate between-group differences. Principle component analysis is a methodological improvement to methods used in previous brain structural covariance network studies. Differences in centrality were observed between groups. Larger centrality was found in maltreated youth with PTSD in the right posterior cingulate cortex; smaller centrality was detected in the right inferior frontal cortex compared to youth resilient to PTSD and controls, demonstrating network characteristics unique to pediatric maltreatment-related PTSD. Larger centrality was detected in right frontal pole in maltreated youth resilient to PTSD compared to youth with PTSD and controls, demonstrating structural covariance network differences in youth resilience to PTSD following maltreatment. Smaller centrality was found in the left posterior cingulate cortex and in the right inferior frontal cortex in maltreated youth compared to controls, demonstrating attributes of structural covariance network topology that is unique to experiencing maltreatment. This work is the first to identify cortical thickness-based structural covariance network differences between maltreated youth with and without PTSD. We demonstrated network differences in both networks unique to maltreated youth with PTSD and those resilient to PTSD. The networks identified are important for the successful attainment of age-appropriate social cognition, attention, emotional processing, and inhibitory control. Our findings in maltreated youth with PTSD versus those without PTSD suggest vulnerability mechanisms for developing PTSD.
Social Media: Strategic Asset or Operational Vulnerability?
2012-05-04
Marine Corps message indicated that social networking sites “are particularly high risk due to information exposure, user generated content, and...Immediate Ban of Internet Social Networking Sites on Marine Corps Enterprise Network NIPRNET,” U.S. Marine Corps, accessed April 3, 2012, http... networking sites via the DoD’s unclassified computer network. The memorandum provided guidance on official use of social networking sites as well
Knowledge Representation Issues in Semantic Graphs for Relationship Detection
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barthelemy, M; Chow, E; Eliassi-Rad, T
2005-02-02
An important task for Homeland Security is the prediction of threat vulnerabilities, such as through the detection of relationships between seemingly disjoint entities. A structure used for this task is a ''semantic graph'', also known as a ''relational data graph'' or an ''attributed relational graph''. These graphs encode relationships as typed links between a pair of typed nodes. Indeed, semantic graphs are very similar to semantic networks used in AI. The node and link types are related through an ontology graph (also known as a schema). Furthermore, each node has a set of attributes associated with it (e.g., ''age'' maymore » be an attribute of a node of type ''person''). Unfortunately, the selection of types and attributes for both nodes and links depends on human expertise and is somewhat subjective and even arbitrary. This subjectiveness introduces biases into any algorithm that operates on semantic graphs. Here, we raise some knowledge representation issues for semantic graphs and provide some possible solutions using recently developed ideas in the field of complex networks. In particular, we use the concept of transitivity to evaluate the relevance of individual links in the semantic graph for detecting relationships. We also propose new statistical measures for semantic graphs and illustrate these semantic measures on graphs constructed from movies and terrorism data.« less
A negative genetic interaction map in isogenic cancer cell lines reveals cancer cell vulnerabilities
Vizeacoumar, Franco J; Arnold, Roland; Vizeacoumar, Frederick S; Chandrashekhar, Megha; Buzina, Alla; Young, Jordan T F; Kwan, Julian H M; Sayad, Azin; Mero, Patricia; Lawo, Steffen; Tanaka, Hiromasa; Brown, Kevin R; Baryshnikova, Anastasia; Mak, Anthony B; Fedyshyn, Yaroslav; Wang, Yadong; Brito, Glauber C; Kasimer, Dahlia; Makhnevych, Taras; Ketela, Troy; Datti, Alessandro; Babu, Mohan; Emili, Andrew; Pelletier, Laurence; Wrana, Jeff; Wainberg, Zev; Kim, Philip M; Rottapel, Robert; O'Brien, Catherine A; Andrews, Brenda; Boone, Charles; Moffat, Jason
2013-01-01
Improved efforts are necessary to define the functional product of cancer mutations currently being revealed through large-scale sequencing efforts. Using genome-scale pooled shRNA screening technology, we mapped negative genetic interactions across a set of isogenic cancer cell lines and confirmed hundreds of these interactions in orthogonal co-culture competition assays to generate a high-confidence genetic interaction network of differentially essential or differential essentiality (DiE) genes. The network uncovered examples of conserved genetic interactions, densely connected functional modules derived from comparative genomics with model systems data, functions for uncharacterized genes in the human genome and targetable vulnerabilities. Finally, we demonstrate a general applicability of DiE gene signatures in determining genetic dependencies of other non-isogenic cancer cell lines. For example, the PTEN−/− DiE genes reveal a signature that can preferentially classify PTEN-dependent genotypes across a series of non-isogenic cell lines derived from the breast, pancreas and ovarian cancers. Our reference network suggests that many cancer vulnerabilities remain to be discovered through systematic derivation of a network of differentially essential genes in an isogenic cancer cell model. PMID:24104479
SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) 2013
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon Rueff; Lyle Roybal; Denis Vollmer
2013-01-01
There is a significant need to protect the nation’s energy infrastructures from malicious actors using cyber methods. Supervisory, Control, and Data Acquisition (SCADA) systems may be vulnerable due to the insufficient security implemented during the design and deployment of these control systems. This is particularly true in older legacy SCADA systems that are still commonly in use. The purpose of INL’s research on the SCADA Protocol Anomaly Detection Utilizing Compression (SPADUC) project was to determine if and how data compression techniques could be used to identify and protect SCADA systems from cyber attacks. Initially, the concept was centered on howmore » to train a compression algorithm to recognize normal control system traffic versus hostile network traffic. Because large portions of the TCP/IP message traffic (called packets) are repetitive, the concept of using compression techniques to differentiate “non-normal” traffic was proposed. In this manner, malicious SCADA traffic could be identified at the packet level prior to completing its payload. Previous research has shown that SCADA network traffic has traits desirable for compression analysis. This work investigated three different approaches to identify malicious SCADA network traffic using compression techniques. The preliminary analyses and results presented herein are clearly able to differentiate normal from malicious network traffic at the packet level at a very high confidence level for the conditions tested. Additionally, the master dictionary approach used in this research appears to initially provide a meaningful way to categorize and compare packets within a communication channel.« less
Bayesian module identification from multiple noisy networks.
Zamani Dadaneh, Siamak; Qian, Xiaoning
2016-12-01
Module identification has been studied extensively in order to gain deeper understanding of complex systems, such as social networks as well as biological networks. Modules are often defined as groups of vertices in these networks that are topologically cohesive with similar interaction patterns with the rest of the vertices. Most of the existing module identification algorithms assume that the given networks are faithfully measured without errors. However, in many real-world applications, for example, when analyzing protein-protein interaction networks from high-throughput profiling techniques, there is significant noise with both false positive and missing links between vertices. In this paper, we propose a new model for more robust module identification by taking advantage of multiple observed networks with significant noise so that signals in multiple networks can be strengthened and help improve the solution quality by combining information from various sources. We adopt a hierarchical Bayesian model to integrate multiple noisy snapshots that capture the underlying modular structure of the networks under study. By introducing a latent root assignment matrix and its relations to instantaneous module assignments in all the observed networks to capture the underlying modular structure and combine information across multiple networks, an efficient variational Bayes algorithm can be derived to accurately and robustly identify the underlying modules from multiple noisy networks. Experiments on synthetic and protein-protein interaction data sets show that our proposed model enhances both the accuracy and resolution in detecting cohesive modules, and it is less vulnerable to noise in the observed data. In addition, it shows higher power in predicting missing edges compared to individual-network methods.
High Assurance Models for Secure Systems
ERIC Educational Resources Information Center
Almohri, Hussain M. J.
2013-01-01
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-05-03
This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less
A graph-based network-vulnerability analysis system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swiler, L.P.; Phillips, C.; Gaylor, T.
1998-01-01
This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less
Brain network alterations and vulnerability to simulated neurodegeneration in breast cancer.
Kesler, Shelli R; Watson, Christa L; Blayney, Douglas W
2015-08-01
Breast cancer and its treatments are associated with mild cognitive impairment and brain changes that could indicate an altered or accelerated brain aging process. We applied diffusion tensor imaging and graph theory to measure white matter organization and connectivity in 34 breast cancer survivors compared with 36 matched healthy female controls. We also investigated how brain networks (connectomes) in each group responded to simulated neurodegeneration based on network attack analysis. Compared with controls, the breast cancer group demonstrated significantly lower fractional anisotropy, altered small-world connectome properties, lower brain network tolerance to systematic region (node), and connection (edge) attacks and significant cognitive impairment. Lower tolerance to network attack was associated with cognitive impairment in the breast cancer group. These findings provide further evidence of diffuse white matter pathology after breast cancer and extend the literature in this area with unique data demonstrating increased vulnerability of the post-breast cancer brain network to future neurodegenerative processes. Copyright © 2015 Elsevier Inc. All rights reserved.
A preliminary analysis of quantifying computer security vulnerability data in "the wild"
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; McNamara, Sean R.; Goldstein, Adam; Cybenko, George
2016-05-01
A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.
NASA Astrophysics Data System (ADS)
Alili, L.; Boukdir, A.; Maslouhi, M. R.; Ikhmerdi, H.
2018-05-01
The study area is located in the north of the province of Beni Mellal, it covers the Piedmont of the high Atlas between El Ksiba and Ouaoumana. It is characterized by a poorly developed hydrographic network and the presence of very important karstic forms. These forms condition the rapid infiltration to the karstic springs are the subject of this study. In this work we presented a method of mapping the vulnerability to pollution of Karstic springs located between El Ksiba and Ouaoumana. To do this, we have introduced a vulnerability index called F which takes into account four parameters (EPIK): Development of the Epikarst, importance of the protective cover, infiltration conditions and development of the Karst network. The overlay of the thematic maps of these parameters through a GIS software (ArcGIS) gave us a map of the vulnerability to contamination on the whole hydrogeological basin of the springs.
Grandiose and Vulnerable Narcissists: Who Is at Higher Risk for Social Networking Addiction?
Casale, Silvia; Fioravanti, Giulia; Rugai, Laura
2016-08-01
Scholars have recently taken an interest in the connection between narcissism and Internet use, especially among users who frequent social networking sites (SNSs). Conversely, the association between narcissism and problematic use of SNSs (i.e., unregulated use that leads to negative outcomes) has been scarcely investigated. This study addresses this gap by comparing the mean levels of problematic use of SNSs among grandiose narcissists, vulnerable narcissists, and non-narcissists. A sample of 535 students completed the 16-item Narcissistic Personality Inventory, the Hypersensitive Narcissism Scale, and the Generalized Problematic Internet Use Scale-2 (GPIUS2). Vulnerable narcissists reported (a) significant higher levels on all GPIUS2 subscales and total scores than non-narcissists and (b) a stronger preference for online social interactions and higher overall levels of problematic use of SNSs than grandiose narcissists. Conversely, no significant differences were found between grandiose narcissists and non-narcissists. This study suggests that vulnerable narcissism may contribute more to problematic use of SNSs than grandiose narcissism.
Lapek, John D; Greninger, Patricia; Morris, Robert; Amzallag, Arnaud; Pruteanu-Malinici, Iulian; Benes, Cyril H; Haas, Wilhelm
2017-10-01
The formation of protein complexes and the co-regulation of the cellular concentrations of proteins are essential mechanisms for cellular signaling and for maintaining homeostasis. Here we use isobaric-labeling multiplexed proteomics to analyze protein co-regulation and show that this allows the identification of protein-protein associations with high accuracy. We apply this 'interactome mapping by high-throughput quantitative proteome analysis' (IMAHP) method to a panel of 41 breast cancer cell lines and show that deviations of the observed protein co-regulations in specific cell lines from the consensus network affects cellular fitness. Furthermore, these aberrant interactions serve as biomarkers that predict the drug sensitivity of cell lines in screens across 195 drugs. We expect that IMAHP can be broadly used to gain insight into how changing landscapes of protein-protein associations affect the phenotype of biological systems.
Burholt, Vanessa; Dobbs, Christine
2014-08-01
This paper considers the support networks of older people in populations with a preponderance of multigenerational households and examines the most vulnerable network types in terms of loneliness and isolation. Current common typologies of support networks may not be sensitive to differences within and between different cultures. This paper uses cross-sectional data drawn from 590 elders (Gujaratis, Punjabis and Sylhetis) living in the United Kingdom and South Asia. Six variables were used in K-means cluster analysis to establish a new network typology. Two logistic regression models using loneliness and isolation as dependent variables assessed the contribution of the new network type to wellbeing. Four support networks were identified: 'Multigenerational Households: Older Integrated Networks', 'Multigenerational Households: Younger Family Networks', 'Family and Friends Integrated Networks' and 'Non-kin Restricted Networks'. Older South Asians with 'Non-kin Restricted Networks' were more likely to be lonely and isolated compared to others. Using network typologies developed with individualistically oriented cultures, distributions are skewed towards more robust network types and could underestimate the support needs of older people from familistic cultures, who may be isolated and lonely and with limited informal sources of help. The new typology identifies different network types within multigenerational households, identifies a greater proportion of older people with vulnerable networks and could positively contribute to service planning.
Cultural knowledge and local vulnerability in African American communities
NASA Astrophysics Data System (ADS)
Miller Hesed, Christine D.; Paolisso, Michael
2015-07-01
Policymakers need to know what factors are most important in determining local vulnerability to facilitate effective adaptation to climate change. Quantitative vulnerability indices are helpful in this endeavour but are limited in their ability to capture subtle yet important aspects of vulnerability such as social networks, knowledge and access to resources. Working with three African American communities on Maryland’s Eastern Shore, we systematically elicit local cultural knowledge on climate change and connect it with a scientific vulnerability framework. The results of this study show that: a given social-ecological factor can substantially differ in the way in which it affects local vulnerability, even among communities with similar demographics and climate-related risks; and social and political isolation inhibits access to sources of adaptive capacity, thereby exacerbating local vulnerability. These results show that employing methods for analysing cultural knowledge can yield new insights to complement those generated by quantitative vulnerability indices.
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
NASA Astrophysics Data System (ADS)
Chen, Shih-Kai; Hsieh, Chih-Heng; Tsai, Cheng-Bin
2017-04-01
Aquifer vulnerability assessment is considered to be an effective tool in controlling potential pollution which is critical for groundwater management. The Choushui River alluvial fan, located in central Taiwan, is an agricultural area with complex crop patterns and various irrigation schemes, which increased the difficulties in groundwater resource management. The aim of this study is to propose an integrated methodology to assess shallow groundwater vulnerability by including land-use impact on groundwater potential pollution. The original groundwater vulnerability methodology, DRASTIC, was modified by adding a land-use parameter in order to assess groundwater vulnerability under intense agricultural activities. To examine the prediction capacity of pollution for the modified DRASTIC model, various risk categories of contamination potentials were compared with observed nitrate-N obtained from groundwater monitoring network. It was found that for the original DRASTIC vulnerability map, some areas with low nitrate-N concentrations are covered within the high vulnerability areas, especially in the northern part of mid-fan areas, where rice paddy is the main crop and planted for two crop seasons per year. The low nitrate-N contamination potential of rice paddies may be resulted from the denitrification in the reduced root zone. By reducing the rating for rice paddies, the modified model was proved to be capable of increasing the precise of prediction in study area. The results can provide a basis for groundwater monitoring network design and effective preserve measures formulation in the mixed agricultural area. Keyword:Aquifer Vulnerability, Groundwater, DRASTIC, Nitrate-N
NASA Astrophysics Data System (ADS)
Shao, Huaiyong; Xian, Wei; Yang, Wunian
2009-07-01
The large-scale and super-strength development of mineral resources in mining cities in long term has made great contributions to China's economic construction and development, but it has caused serious damage to the ecological environment even ecological imbalance at the same time because the neglect of the environmental impact even to the expense of the environment to some extent. In this study, according to the characteristics of mining cities, the scientific and practical eco-environmental vulnerability evaluation index system of mining cities had been established. Taking Panzhihua city of Sichuan province as an example, using remote sensing and GIS technology, applying various types of remote sensing image (TM, SPOT5, IKONOS) and Statistical data, the ecological environment evaluation data of mining cities was extracted effectively. For the non-linear relationship between the evaluation indexes and the degree of eco-environmental vulnerability in mining cities, this study innovative took the evaluation of eco-environmental vulnerability of the study area by using artificial neural network whose training used SCE-UA algorithm that well overcome the slow learning and difficult convergence of traditional neural network algorithm. The results of ecoenvironmental vulnerability evaluation of the study area were objective, reasonable and the credibility was high. The results showed that the area distribution of five eco-environmental vulnerability grade types was basically normal, and the overall ecological environment situation of Panzhihua city was in the middle level, the degree of eco-environmental vulnerability in the south was higher than the north, and mining activities were dominant factors to cause ecoenvironmental damage and eco-environmental Vulnerability. In this study, a comprehensive theory and technology system of regional eco-environmental vulnerability evaluation which included the establishment of eco-environmental vulnerability evaluation index system, processing of evaluation data and establishing of evaluation model. New ideas and methods had provided for eco-environmental vulnerability of mining cities.
Finite Energy and Bounded Attacks on Control System Sensor Signals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less
DARKDROID: Exposing the Dark Side of Android Marketplaces
2016-06-01
Moreover, our approaches can detect apps containing both intentional and unintentional vulnerabilities, such as unsafe code loading mechanisms and...Security, Static Analysis, Dynamic Analysis, Malware Detection , Vulnerability Scanning 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18...applications in a DoD context. ................... 1 1.2.2 Develop sophisticated whole-system static analyses to detect malicious Android applications
A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mousavian, Seyedamirabbas; Valenzuela, Jorge; Wang, Jianhui
The power grid is becoming more dependent on information and communication technologies. Complex networks of advanced sensors such as phasor measurement units (PMUs) are used to collect real time data to improve the observability of the power system. Recent studies have shown that the power grid has significant cyber vulnerabilities which could increase when PMUs are used extensively. Therefore, recognizing and responding to vulnerabilities are critical to the security of the power grid. This paper proposes a risk mitigation model for optimal response to cyber-attacks to PMU networks. We model the optimal response action as a mixed integer linear programmingmore » (MILP) problem to prevent propagation of the cyber-attacks and maintain the observability of the power system.« less
Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua
2014-01-01
Simple Summary The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to members of the community who are already considered vulnerable? This article addresses this important question by synthesizing information about what makes seven particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. It concludes that animal attachment could provide a novel conduit for accessing, communicating with and motivating vulnerable people to engage in resilience building behaviors that promote survival and facilitate recovery. Abstract Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or ‘piggybacking’ disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together. PMID:26480038
Vulnerability of Rhode Island Salt Marshes to Sea Level Rise and Poor Water Quality
Across the northeastern Unites States, salt marshes are losing ground. Edges are eroding, tidal channel networks are expanding, and new ponds are forming and expanding within salt marshes. This leaves shorelines - and in some cases houses - more vulnerable to nor'easters and tr...
Social Capital and Vulnerability from the Family, Neighborhood, School, and Community Perspectives
ERIC Educational Resources Information Center
Williams, Bonita; Le Menestrel, Suzanne M.
2013-01-01
This article reviews research and offers program examples for developing social capital in youth with a range of vulnerabilities: emotional, physical, social, and developmental. Protective factors provided by developing social capital at the individual level include access to support networks, transition to employment, and community connectedness.…
ERIC Educational Resources Information Center
Williams, Cheryl S.; Krueger, Keith R.
2005-01-01
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Hot spots in a wired world: WHO surveillance of emerging and re-emerging infectious diseases.
Heymann, D L; Rodier, G R
2001-12-01
The resurgence of the microbial threat, rooted in several recent trends, has increased the vulnerability of all nations to the risk of infectious diseases, whether newly emerging, well-established, or deliberately caused. Infectious disease intelligence, gleaned through sensitive surveillance, is the best defence. The epidemiological and laboratory techniques needed to detect, investigate, and contain a deliberate outbreak are the same as those used for natural outbreaks. In April 2000, WHO formalised an infrastructure (the Global Outbreak Alert and Response Network) for responding to the heightened need for early awareness of outbreaks and preparedness to respond. The Network, which unites 110 existing networks, is supported by several new mechanisms and a computer-driven tool for real time gathering of disease intelligence. The procedure for outbreak alert and response has four phases: systematic detection, outbreak verification, real time alerts, and rapid response. For response, the framework uses different strategies for combating known risks and unexpected events, and for improving both global and national preparedness. New forces at work in an electronically interconnected world are beginning to break down the traditional reluctance of countries to report outbreaks due to fear of the negative impact on trade and tourism. About 65% of the world's first news about infectious disease events now comes from informal sources, including press reports and the internet.
Is It Time for a US Cyber Force?
2015-02-17
network of information technology (IT) and resident data, including the Internet , telecommunications networks, computer systems, and embedded processors...and controllers.13 JP 3-12 further goes on to explain cyberspace in terms of three layers: physical network, logical network, and cyber- persona .14...zero day) vulnerabilities against Microsoft operating system code using trusted hardware vendor certificates to cloak their presence. Though not
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Veerasamy, Anitha; Madane, Srinivasa Rao; Sivakumar, K; Sivaraman, Audithan
2016-01-01
Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.
Bonilha, Leonardo; Tabesh, Ali; Dabbs, Kevin; Hsu, David A.; Stafstrom, Carl E.; Hermann, Bruce P.; Lin, Jack J.
2014-01-01
Recent neuroimaging and behavioral studies have revealed that children with new onset epilepsy already exhibit brain structural abnormalities and cognitive impairment. How the organization of large-scale brain structural networks is altered near the time of seizure onset and whether network changes are related to cognitive performances remain unclear. Recent studies also suggest that regional brain volume covariance reflects synchronized brain developmental changes. Here, we test the hypothesis that epilepsy during early-life is associated with abnormalities in brain network organization and cognition. We used graph theory to study structural brain networks based on regional volume covariance in 39 children with new-onset seizures and 28 healthy controls. Children with new-onset epilepsy showed a suboptimal topological structural organization with enhanced network segregation and reduced global integration compared to controls. At the regional level, structural reorganization was evident with redistributed nodes from the posterior to more anterior head regions. The epileptic brain network was more vulnerable to targeted but not random attacks. Finally, a subgroup of children with epilepsy, namely those with lower IQ and poorer executive function, had a reduced balance between network segregation and integration. Taken together, the findings suggest that the neurodevelopmental impact of new onset childhood epilepsies alters large-scale brain networks, resulting in greater vulnerability to network failure and cognitive impairment. PMID:24453089
Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.
King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S
2018-05-01
As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.
Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A
King, Cason R.; Zhang, Ali; Tessier, Tanner M.; Gameiro, Steven F.
2018-01-01
ABSTRACT As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected “hub” proteins to “hack” the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. PMID:29717008
Ecological networks are more sensitive to plant than to animal extinction under climate change
Schleuning, Matthias; Fründ, Jochen; Schweiger, Oliver; Welk, Erik; Albrecht, Jörg; Albrecht, Matthias; Beil, Marion; Benadi, Gita; Blüthgen, Nico; Bruelheide, Helge; Böhning-Gaese, Katrin; Dehling, D. Matthias; Dormann, Carsten F.; Exeler, Nina; Farwig, Nina; Harpke, Alexander; Hickler, Thomas; Kratochwil, Anselm; Kuhlmann, Michael; Kühn, Ingolf; Michez, Denis; Mudri-Stojnić, Sonja; Plein, Michaela; Rasmont, Pierre; Schwabe, Angelika; Settele, Josef; Vujić, Ante; Weiner, Christiane N.; Wiemers, Martin; Hof, Christian
2016-01-01
Impacts of climate change on individual species are increasingly well documented, but we lack understanding of how these effects propagate through ecological communities. Here we combine species distribution models with ecological network analyses to test potential impacts of climate change on >700 plant and animal species in pollination and seed-dispersal networks from central Europe. We discover that animal species that interact with a low diversity of plant species have narrow climatic niches and are most vulnerable to climate change. In contrast, biotic specialization of plants is not related to climatic niche breadth and vulnerability. A simulation model incorporating different scenarios of species coextinction and capacities for partner switches shows that projected plant extinctions under climate change are more likely to trigger animal coextinctions than vice versa. This result demonstrates that impacts of climate change on biodiversity can be amplified via extinction cascades from plants to animals in ecological networks. PMID:28008919
Ecological networks are more sensitive to plant than to animal extinction under climate change.
Schleuning, Matthias; Fründ, Jochen; Schweiger, Oliver; Welk, Erik; Albrecht, Jörg; Albrecht, Matthias; Beil, Marion; Benadi, Gita; Blüthgen, Nico; Bruelheide, Helge; Böhning-Gaese, Katrin; Dehling, D Matthias; Dormann, Carsten F; Exeler, Nina; Farwig, Nina; Harpke, Alexander; Hickler, Thomas; Kratochwil, Anselm; Kuhlmann, Michael; Kühn, Ingolf; Michez, Denis; Mudri-Stojnić, Sonja; Plein, Michaela; Rasmont, Pierre; Schwabe, Angelika; Settele, Josef; Vujić, Ante; Weiner, Christiane N; Wiemers, Martin; Hof, Christian
2016-12-23
Impacts of climate change on individual species are increasingly well documented, but we lack understanding of how these effects propagate through ecological communities. Here we combine species distribution models with ecological network analyses to test potential impacts of climate change on >700 plant and animal species in pollination and seed-dispersal networks from central Europe. We discover that animal species that interact with a low diversity of plant species have narrow climatic niches and are most vulnerable to climate change. In contrast, biotic specialization of plants is not related to climatic niche breadth and vulnerability. A simulation model incorporating different scenarios of species coextinction and capacities for partner switches shows that projected plant extinctions under climate change are more likely to trigger animal coextinctions than vice versa. This result demonstrates that impacts of climate change on biodiversity can be amplified via extinction cascades from plants to animals in ecological networks.
Leveraging Social Links for Trust and Privacy in Networks
NASA Astrophysics Data System (ADS)
Cutillo, Leucio Antonio; Molva, Refik; Strufe, Thorsten
Existing on-line social networks (OSN) such as Facebook suffer from several weaknesses regarding privacy and security due to their inherent handling of personal data. As pointed out in [4], a preliminary analysis of existing OSNs shows that they are subject to a number of vulnerabilities, ranging from cloning legitimate users to sybil attacks through privacy violations. Starting from these OSN vulnerabilities as the first step of a broader research activity, we came up with a new approach that is very promising in re-visiting security and privacy problems in distributed systems and networks. We suggest a solution that both aims at avoiding any centralized control and leverages on the real life trust between users, that is part of the social network application itself. An anonymization technique based on multi-hop routing among trusted nodes guarantees privacy in data access and, generally speaking, in all the OSN operations.
Vulnerability detection using data-flow graphs and SMT solvers
2016-10-31
concerns. The framework is modular and pipelined to allow scalable analysis on distributed systems. Our vulnerability detection framework employs machine...Design We designed the framework to be modular to enable flexible reuse and extendibility. In its current form, our framework performs the following
Integrating network ecology with applied conservation: a synthesis and guide to implementation.
Kaiser-Bunbury, Christopher N; Blüthgen, Nico
2015-07-10
Ecological networks are a useful tool to study the complexity of biotic interactions at a community level. Advances in the understanding of network patterns encourage the application of a network approach in other disciplines than theoretical ecology, such as biodiversity conservation. So far, however, practical applications have been meagre. Here we present a framework for network analysis to be harnessed to advance conservation management by using plant-pollinator networks and islands as model systems. Conservation practitioners require indicators to monitor and assess management effectiveness and validate overall conservation goals. By distinguishing between two network attributes, the 'diversity' and 'distribution' of interactions, on three hierarchical levels (species, guild/group and network) we identify seven quantitative metrics to describe changes in network patterns that have implications for conservation. Diversity metrics are partner diversity, vulnerability/generality, interaction diversity and interaction evenness, and distribution metrics are the specialization indices d' and [Formula: see text] and modularity. Distribution metrics account for sampling bias and may therefore be suitable indicators to detect human-induced changes to plant-pollinator communities, thus indirectly assessing the structural and functional robustness and integrity of ecosystems. We propose an implementation pathway that outlines the stages that are required to successfully embed a network approach in biodiversity conservation. Most importantly, only if conservation action and study design are aligned by practitioners and ecologists through joint experiments, are the findings of a conservation network approach equally beneficial for advancing adaptive management and ecological network theory. We list potential obstacles to the framework, highlight the shortfall in empirical, mostly experimental, network data and discuss possible solutions. Published by Oxford University Press on behalf of the Annals of Botany Company.
Securing Information with Complex Optical Encryption Networks
2015-08-11
Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military
ERIC Educational Resources Information Center
Knowlton, Amy R.; Latkin, Carl A.
2007-01-01
The study examined multiple dimensions of social support as predictors of depressive symptoms among a highly vulnerable population. Social network analysis was used to assess perceived and enacted dimensions of support (emotional, financial, instrumental), network conflict, closeness, and composition. Participants were 393 current and former…
The Effects of Observation Errors on the Attack Vulnerability of Complex Networks
2012-11-01
more detail, to construct a true network we select a topology (erdos- renyi (Erdos & Renyi , 1959), scale-free (Barabási & Albert, 1999), small world...Efficiency of Scale-Free Networks: Error and Attack Tolerance. Physica A, Volume 320, pp. 622-642. 6. Erdos, P. & Renyi , A., 1959. On Random Graphs, I
NASA Astrophysics Data System (ADS)
Peng, Chaorong; Chen, Chang Wen
2008-04-01
Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.
Method and Apparatus for Reducing the Vulnerability of Latches to Single Event Upsets
NASA Technical Reports Server (NTRS)
Shuler, Robert L., Jr. (Inventor)
2002-01-01
A delay circuit includes a first network having an input and an output node, a second network having an input and an output, the input of the second network being coupled to the output node of the first network. The first network and the second network are configured such that: a glitch at the input to the first network having a length of approximately one-half of a standard glitch time or less does not cause the voltage at the output of the second network to cross a threshold, a glitch at the input to the first network having a length of between approximately one-half and two standard glitch times causes the voltage at the output of the second network to cross the threshold for less than the length of the glitch, and a glitch at the input to the first network having a length of greater than approximately two standard glitch times causes the voltage at the output of the second network to cross the threshold for approximately the time of the glitch. The method reduces the vulnerability of a latch to single event upsets. The latch includes a gate having an input and an output and a feedback path from the output to the input of the gate. The method includes inserting a delay into the feedback path and providing a delay in the gate.
Method and Apparatus for Reducing the Vulnerability of Latches to Single Event Upsets
NASA Technical Reports Server (NTRS)
Shuler, Robert L., Jr. (Inventor)
2002-01-01
A delay circuit includes a first network having an input and an output node, a second network having an input and an output, the input of the second network being coupled to the output node of the first network. The first network and the second network are configured such that: a glitch at the input to the first network having a length of approximately one-half of a standard glitch time or less does not cause tile voltage at the output of the second network to cross a threshold, a glitch at the input to the first network having a length of between approximately one-half and two standard glitch times causes the voltage at the output of the second network to cross the threshold for less than the length of the glitch, and a glitch at the input to the first network having a length of greater than approximately two standard glitch times causes the voltage at the output of the second network to cross the threshold for approximately the time of the glitch. A method reduces the vulnerability of a latch to single event upsets. The latch includes a gate having an input and an output and a feedback path from the output to the input of the gate. The method includes inserting a delay into the feedback path and providing a delay in the gate.
ERIC Educational Resources Information Center
Brooks, Tyson T.
2013-01-01
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-09
... allege that hackers were able to exploit vulnerabilities in the computer networks of multiple end user clients, putting all consumer reports in those networks at risk. In multiple breaches, hackers accessed...
Chen, Jing; Wilkinson, Diana; Richardson, Richard B; Waruszynski, Barbara
2009-06-01
The Workshop on Emergency Preparedness for Vulnerable Population Groups was held on 2 and 3 March 2009 in Ottawa, ON, Canada. The purpose of the workshop was to enhance communications within the emergency community response network and to identify the needs and gaps of emergency preparedness against chemical, biological, radiological, nuclear and explosives events for vulnerable population groups. The workshop was organised to enable extensive round-table discussions and provide a summary of key issues, considerations and recommendations for emergency response planners.
NASA Astrophysics Data System (ADS)
Liu, Xuan
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.
NASA Astrophysics Data System (ADS)
von Hillebrandt-Andrade, C.; Huerfano Moreno, V. A.; McNamara, D. E.; Saurel, J. M.
2014-12-01
The magnitude-9.3 Sumatra-Andaman Islands earthquake of December 26, 2004, increased global awareness to the destructive hazard of earthquakes and tsunamis. Post event assessments of global coastline vulnerability highlighted the Caribbean as a region of high hazard and risk and that it was poorly monitored. Nearly 100 tsunamis have been reported for the Caribbean region and Adjacent Regions in the past 500 years and continue to pose a threat for its nations, coastal areas along the Gulf of Mexico, and the Atlantic seaboard of North and South America. Significant efforts to improve monitoring capabilities have been undertaken since this time including an expansion of the United States Geological Survey (USGS) Global Seismographic Network (GSN) (McNamara et al., 2006) and establishment of the United Nations Educational, Scientific and Cultural Organization (UNESCO) Intergovernmental Coordination Group (ICG) for the Tsunami and other Coastal Hazards Warning System for the Caribbean and Adjacent Regions (CARIBE EWS). The minimum performance standards it recommended for initial earthquake locations include: 1) Earthquake detection within 1 minute, 2) Minimum magnitude threshold = M4.5, and 3) Initial hypocenter error of <30 km. In this study, we assess current compliance with performance standards and model improvements in earthquake and tsunami monitoring capabilities in the Caribbean region since the first meeting of the UNESCO ICG-Caribe EWS in 2006. The three measures of network capability modeled in this study are: 1) minimum Mw detection threshold; 2) P-wave detection time of an automatic processing system and; 3) theoretical earthquake location uncertainty. By modeling three measures of seismic network capability, we can optimize the distribution of ICG-Caribe EWS seismic stations and select an international network that will be contributed from existing real-time broadband national networks in the region. Sea level monitoring improvements both offshore and along the coast will also be addressed. With the support of Member States and other countries and organizations it has been possible to significantly expand the sea level network thus reducing the amount of time it now takes to verify tsunamis.
A Dynamic Game on Network Topology for Counterinsurgency Applications
2015-03-26
scenario. This study creates a dynamic game on network topology to provide insight into the effec- tiveness of offensive targeting strategies determined by...focused upon the diffusion of thoughts and innovations throughout complex social networks. Coleman et al. (1966) and Ryan & Gross (1950) investigated...free networks make them extremely resilient against errors but very vulnerable to attack. Most interest- ingly, a determined attacker can remove well
NASA Astrophysics Data System (ADS)
Pillosu, F. M.; Jurlina, T.; Baugh, C.; Tsonevsky, I.; Hewson, T.; Prates, F.; Pappenberger, F.; Prudhomme, C.
2017-12-01
During hurricane Harvey the greater east Texas area was affected by extensive flash flooding. Their localised nature meant they were too small for conventional large scale flood forecasting systems to capture. We are testing the use of two real time forecast products from the European Centre for Medium-range Weather Forecasts (ECMWF) in combination with local vulnerability information to provide flash flood forecasting tools at the medium range (up to 7 days ahead). Meteorological forecasts are the total precipitation extreme forecast index (EFI), a measure of how the ensemble forecast probability distribution differs from the model-climate distribution for the chosen location, time of year and forecast lead time; and the shift of tails (SOT) which complements the EFI by quantifying how extreme an event could potentially be. Both products give the likelihood of flash flood generating precipitation. For hurricane Harvey, 3-day EFI and SOT products for the period 26th - 29th August 2017 were used, generated from the twice daily, 18 km, 51 ensemble member ECMWF Integrated Forecast System. After regridding to 1 km resolution the forecasts were combined with vulnerable area data to produce a flash flood hazard risk area. The vulnerability data were floodplains (EU Joint Research Centre), road networks (Texas Department of Transport) and urban areas (Census Bureau geographic database), together reflecting the susceptibility to flash floods from the landscape. The flash flood hazard risk area forecasts were verified using a traditional approach against observed National Weather Service flash flood reports, a total of 153 reported flash floods have been detected in that period. Forecasts performed best for SOT = 5 (hit ratio = 65%, false alarm ratio = 44%) and EFI = 0.7 (hit ratio = 74%, false alarm ratio = 45%) at 72 h lead time. By including the vulnerable areas data, our verification results improved by 5-15%, demonstrating the value of vulnerability information within natural hazard forecasts. This research shows that flash flooding from hurricane Harvey was predictable up to 4 days ahead and that filtering the forecasts to vulnerable areas provides a more focused guidance to civil protection agencies planning their emergency response.
Vulnerability and cosusceptibility determine the size of network cascades
Yang, Yang; Nishikawa, Takashi; Motter, Adilson E.
2017-01-27
In a network, a local disturbance can propagate and eventually cause a substantial part of the system to fail in cascade events that are easy to conceptualize but extraordinarily difficult to predict. Furthermore, we develop a statistical framework that can predict cascade size distributions by incorporating two ingredients only: the vulnerability of individual components and the cosusceptibility of groups of components (i.e., their tendency to fail together). Using cascades in power grids as a representative example, we show that correlations between component failures define structured and often surprisingly large groups of cosusceptible components. Aside from their implications for blackout studies,more » these results provide insights and a new modeling framework for understanding cascades in financial systems, food webs, and complex networks in general.« less
Prefrontal vulnerabilities and whole brain connectivity in aging and depression.
Lamar, Melissa; Charlton, Rebecca A; Ajilore, Olusola; Zhang, Aifeng; Yang, Shaolin; Barrick, Thomas R; Rhodes, Emma; Kumar, Anand
2013-07-01
Studies exploring the underpinnings of age-related neurodegeneration suggest fronto-limbic alterations that are increasingly vulnerable in the presence of disease including late life depression. Less work has assessed the impact of this specific vulnerability on widespread brain circuitry. Seventy-nine older adults (healthy controls=45; late life depression=34) completed translational tasks shown in non-human primates to rely on fronto-limbic networks involving dorsolateral (Self-Ordered Pointing Task) or orbitofrontal (Object Alternation Task) cortices. A sub-sample of participants also completed diffusion tensor imaging for white matter tract quantification (uncinate and cingulum bundle; n=58) and whole brain tract-based spatial statistics (n=62). Despite task associations to specific white matter tracts across both groups, only healthy controls demonstrated significant correlations between widespread tract integrity and cognition. Thus, increasing Object Alternation Task errors were associated with decreasing fractional anisotropy in the uncinate in late life depression; however, only in healthy controls was the uncinate incorporated into a larger network of white matter vulnerability associating fractional anisotropy with Object Alternation Task errors using whole brain tract-based spatial statistics. It appears that the whole brain impact of specific fronto-limbic vulnerabilities in aging may be eclipsed in the presence of disease-specific neuropathology like that seen in late life depression. Copyright © 2013 Elsevier Ltd. All rights reserved.
Great Lakes harbors/embayments are vulnerable to introductions of non-indigenous species (NIS). Early detection of new NIS is desirable to allow for a timely management response, raising the question of how to accomplish this in a consistent, cost-effective manner. To that end, ...
McGreevy, Conor; Harrop, Wayne
2015-01-01
Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.
Appliance of Independent Component Analysis to System Intrusion Analysis
NASA Astrophysics Data System (ADS)
Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji
In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.
Recent plant eradications on the islands of Maui County, Hawai'i
Penniman, Teya M.; Buchanan, Lori; Loope, Lloyd L.; Veitch, C.R.; Clout, Mike N.; Towns, D. R.
2011-01-01
The state of Hawai'i (USA) has few regulations to limit plant introductions. A network of interagency islandbased invasive species committees has evolved over the past decade to address this vulnerability, with the aim of stopping invasions before they threaten natural areas. On Maui, Moloka‘i, and Lāna‘i, which comprise three of the four islands of Maui County, single-island eradications have been achieved for 12 plant species and eradication is likely imminent for an additional eight species. The islands vary in size, population, and land ownership. We explore the relative importance of those variables in achieving successful eradications along with target species selection, detection strategies, and public support
Vulnerability of dynamic genetic conservation units of forest trees in Europe to climate change.
Schueler, Silvio; Falk, Wolfgang; Koskela, Jarkko; Lefèvre, François; Bozzano, Michele; Hubert, Jason; Kraigher, Hojka; Longauer, Roman; Olrik, Ditte C
2014-05-01
A transnational network of genetic conservation units for forest trees was recently documented in Europe aiming at the conservation of evolutionary processes and the adaptive potential of natural or man-made tree populations. In this study, we quantified the vulnerability of individual conservation units and the whole network to climate change using climate favourability models and the estimated velocity of climate change. Compared to the overall climate niche of the analysed target species populations at the warm and dry end of the species niche are underrepresented in the network. However, by 2100, target species in 33-65 % of conservation units, mostly located in southern Europe, will be at the limit or outside the species' current climatic niche as demonstrated by favourabilities below required model sensitivities of 95%. The highest average decrease in favourabilities throughout the network can be expected for coniferous trees although they are mainly occurring within units in mountainous landscapes for which we estimated lower velocities of change. Generally, the species-specific estimates of favourabilities showed only low correlations to the velocity of climate change in individual units, indicating that both vulnerability measures should be considered for climate risk analysis. The variation in favourabilities among target species within the same conservation units is expected to increase with climate change and will likely require a prioritization among co-occurring species. The present results suggest that there is a strong need to intensify monitoring efforts and to develop additional conservation measures for populations in the most vulnerable units. Also, our results call for continued transnational actions for genetic conservation of European forest trees, including the establishment of dynamic conservation populations outside the current species distribution ranges within European assisted migration schemes. © 2013 John Wiley & Sons Ltd.
Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation
DOT National Transportation Integrated Search
2011-03-01
The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...
Specializing network analysis to detect anomalous insider actions
Chen, You; Nyemba, Steve; Zhang, Wen; Malin, Bradley
2012-01-01
Collaborative information systems (CIS) enable users to coordinate efficiently over shared tasks in complex distributed environments. For flexibility, they provide users with broad access privileges, which, as a side-effect, leave such systems vulnerable to various attacks. Some of the more damaging malicious activities stem from internal misuse, where users are authorized to access system resources. A promising class of insider threat detection models for CIS focuses on mining access patterns from audit logs, however, current models are limited in that they assume organizations have significant resources to generate label cases for training classifiers or assume the user has committed a large number of actions that deviate from “normal” behavior. In lieu of the previous assumptions, we introduce an approach that detects when specific actions of an insider deviate from expectation in the context of collaborative behavior. Specifically, in this paper, we introduce a specialized network anomaly detection model, or SNAD, to detect such events. This approach assesses the extent to which a user influences the similarity of the group of users that access a particular record in the CIS. From a theoretical perspective, we show that the proposed model is appropriate for detecting insider actions in dynamic collaborative systems. From an empirical perspective, we perform an extensive evaluation of SNAD with the access logs of two distinct environments: the patient record access logs a large electronic health record system (6,015 users, 130,457 patients and 1,327,500 accesses) and the editing logs of Wikipedia (2,394,385 revisors, 55,200 articles and 6,482,780 revisions). We compare our model with several competing methods and demonstrate SNAD is significantly more effective: on average it achieves 20–30% greater area under an ROC curve. PMID:23399988
Jo, J A; Fang, Q; Papaioannou, T; Qiao, J H; Fishbein, M C; Beseth, B; Dorafshar, A H; Reil, T; Baker, D; Freischlag, J; Shung, K K; Sun, L; Marcu, L
2006-01-01
In this study, time-resolved laser-induced fluorescence spectroscopy (TR-LIFS) and ultrasonography were applied to detect vulnerable (high-risk) atherosclerotic plaque. A total of 813 TR-LIFS measurements were taken from carotid plaques of 65 patients, and subsequently analyzed using the Laguerre deconvolution technique. The investigated spots were classified by histopathology as thin, fibrotic, calcified, low-inflamed, inflamed and necrotic lesions. Spectral and time-resolved parameters (normalized intensity values and Laguerre expansion coefficients) were extracted from the TR-LIFS data. Feature selection for classification was performed by either analysis of variance (ANOVA) or principal component analysis (PCA). A stepwise linear discriminant analysis algorithm was developed for detecting inflamed and necrotic lesion, representing the most vulnerable plaques. These vulnerable plaques were detected with high sensitivity (>80%) and specificity (>90%). Ultrasound (US) imaging was obtained in 4 carotid plaques in addition to TR-LIFS examination. Preliminary results indicate that US provides important structural information of the plaques that could be combined with the compositional information obtained by TR-LIFS, to obtain a more accurate diagnosis of vulnerable atherosclerotic plaque.
ERIC Educational Resources Information Center
Silva, Marisa; da Silva, Sofia Marques; Araújo, Helena C
2017-01-01
This article presents an analysis of school principals' perspectives on networking concerning schools and school clusters from areas of social vulnerability (Educational Territories of Priority Intervention (TEIP)) in Northern Portugal. The meanings, purpose, benefits and difficulties of networking in education are examined, based on interviews…
Loss of integrity and atrophy in cingulate structural covariance networks in Parkinson's disease.
de Schipper, Laura J; van der Grond, Jeroen; Marinus, Johan; Henselmans, Johanna M L; van Hilten, Jacobus J
2017-01-01
In Parkinson's disease (PD), the relation between cortical brain atrophy on MRI and clinical progression is not straightforward. Determination of changes in structural covariance networks - patterns of covariance in grey matter density - has shown to be a valuable technique to detect subtle grey matter variations. We evaluated how structural network integrity in PD is related to clinical data. 3 Tesla MRI was performed in 159 PD patients. We used nine standardized structural covariance networks identified in 370 healthy subjects as a template in the analysis of the PD data. Clinical assessment comprised motor features (Movement Disorder Society-Unified Parkinson's Disease Rating Scale; MDS-UPDRS motor scale) and predominantly non-dopaminergic features (SEverity of Non-dopaminergic Symptoms in Parkinson's Disease; SENS-PD scale: postural instability and gait difficulty, psychotic symptoms, excessive daytime sleepiness, autonomic dysfunction, cognitive impairment and depressive symptoms). Voxel-based analyses were performed within networks significantly associated with PD. The anterior and posterior cingulate network showed decreased integrity, associated with the SENS-PD score, p = 0.001 (β = - 0.265, η p 2 = 0.070) and p = 0.001 (β = - 0.264, η p 2 = 0.074), respectively. Of the components of the SENS-PD score, cognitive impairment and excessive daytime sleepiness were associated with atrophy within both networks. We identified loss of integrity and atrophy in the anterior and posterior cingulate networks in PD patients. Abnormalities of both networks were associated with predominantly non-dopaminergic features, specifically cognition and excessive daytime sleepiness. Our findings suggest that (components of) the cingulate networks display a specific vulnerability to the pathobiology of PD and may operate as interfaces between networks involved in cognition and alertness.
Climate change and vulnerability of bull trout (Salvelinus confluentus ) in a fire-prone landscape
Jeffrey A. Falke; Rebecca L. Flitcroft; Jason B. Dunham; Kristina M. McNyset; Paul F. Hessburg; Gordon H. Reeves; C. Tara Marshall
2015-01-01
Linked atmospheric and wildfire changes will complicate future management of native coldwater fishes in fire-prone landscapes, and new approaches to management that incorporate uncertainty are needed to address this challenge. We used a Bayesian network (BN) approach to evaluate population vulnerability of bull trout (Salvelinus confluentus) in the Wenatchee River...
Bonilha, Leonardo; Tabesh, Ali; Dabbs, Kevin; Hsu, David A; Stafstrom, Carl E; Hermann, Bruce P; Lin, Jack J
2014-08-01
Recent neuroimaging and behavioral studies have revealed that children with new onset epilepsy already exhibit brain structural abnormalities and cognitive impairment. How the organization of large-scale brain structural networks is altered near the time of seizure onset and whether network changes are related to cognitive performances remain unclear. Recent studies also suggest that regional brain volume covariance reflects synchronized brain developmental changes. Here, we test the hypothesis that epilepsy during early-life is associated with abnormalities in brain network organization and cognition. We used graph theory to study structural brain networks based on regional volume covariance in 39 children with new-onset seizures and 28 healthy controls. Children with new-onset epilepsy showed a suboptimal topological structural organization with enhanced network segregation and reduced global integration compared with controls. At the regional level, structural reorganization was evident with redistributed nodes from the posterior to more anterior head regions. The epileptic brain network was more vulnerable to targeted but not random attacks. Finally, a subgroup of children with epilepsy, namely those with lower IQ and poorer executive function, had a reduced balance between network segregation and integration. Taken together, the findings suggest that the neurodevelopmental impact of new onset childhood epilepsies alters large-scale brain networks, resulting in greater vulnerability to network failure and cognitive impairment. Copyright © 2014 Wiley Periodicals, Inc.
NASA Astrophysics Data System (ADS)
Ginsberg, Mark D.; Smith, Eddy D.; VanBlaricum, Vicki; Hock, Vincent F.; Kroll, Dan; Russell, Kevin J.
2010-04-01
Both real events and models have proven that drinking water systems are vulnerable to deliberate and/or accidental contamination. Additionally, homeland security initiatives and modeling efforts have determined that it is relatively easy to orchestrate the contamination of potable water supplies. Such contamination can be accomplished with classic and non-traditional chemical agents, toxic industrial chemicals (TICs), and/or toxic industrial materials (TIMs). Subsequent research and testing has developed a proven network for detection and response to these threats. The method uses offthe- shelf, broad-spectrum analytical instruments coupled with advanced interpretive algorithms. The system detects and characterizes any backflow events involving toxic contaminants by employing unique chemical signature (fingerprint) response data. This instrumentation has been certified by the Office of Homeland Security for detecting deliberate and/or accidental contamination of critical water infrastructure. The system involves integration of several mature technologies (sensors, SCADA, dynamic models, and the HACH HST Guardian Blue instrumentation) into a complete, real-time, management system that also can be used to address other water distribution concerns, such as corrosion. This paper summarizes the reasons and results for installing such a distribution-based detection and protection system.
Ahn, Jae Joon; Kim, Young Min; Yoo, Keunje; Park, Joonhong; Oh, Kyong Joo
2012-11-01
For groundwater conservation and management, it is important to accurately assess groundwater pollution vulnerability. This study proposed an integrated model using ridge regression and a genetic algorithm (GA) to effectively select the major hydro-geological parameters influencing groundwater pollution vulnerability in an aquifer. The GA-Ridge regression method determined that depth to water, net recharge, topography, and the impact of vadose zone media were the hydro-geological parameters that influenced trichloroethene pollution vulnerability in a Korean aquifer. When using these selected hydro-geological parameters, the accuracy was improved for various statistical nonlinear and artificial intelligence (AI) techniques, such as multinomial logistic regression, decision trees, artificial neural networks, and case-based reasoning. These results provide a proof of concept that the GA-Ridge regression is effective at determining influential hydro-geological parameters for the pollution vulnerability of an aquifer, and in turn, improves the AI performance in assessing groundwater pollution vulnerability.
Quantifying 10 years of improved earthquake-monitoring performance in the Caribbean region
McNamara, Daniel E.; Hillebrandt-Andrade, Christa; Saurel, Jean-Marie; Huerfano-Moreno, V.; Lynch, Lloyd
2015-01-01
Over 75 tsunamis have been documented in the Caribbean and adjacent regions during the past 500 years. Since 1500, at least 4484 people are reported to have perished in these killer waves. Hundreds of thousands are currently threatened along the Caribbean coastlines. Were a great tsunamigenic earthquake to occur in the Caribbean region today, the effects would potentially be catastrophic due to an increasingly vulnerable region that has seen significant population increases in the past 40–50 years and currently hosts an estimated 500,000 daily beach visitors from North America and Europe, a majority of whom are not likely aware of tsunami and earthquake hazards. Following the magnitude 9.1 Sumatra–Andaman Islands earthquake of 26 December 2004, the United Nations Educational, Scientific and Cultural Organization (UNESCO) Intergovernmental Coordination Group (ICG) for the Tsunami and other Coastal Hazards Early Warning System for the Caribbean and Adjacent Regions (CARIBE‐EWS) was established and developed minimum performance standards for the detection and analysis of earthquakes. In this study, we model earthquake‐magnitude detection threshold and P‐wave detection time and demonstrate that the requirements established by the UNESCO ICG CARIBE‐EWS are met with 100% of the network operating. We demonstrate that earthquake‐monitoring performance in the Caribbean Sea region has improved significantly in the past decade as the number of real‐time seismic stations available to the National Oceanic and Atmospheric Administration tsunami warning centers have increased. We also identify weaknesses in the current international network and provide guidance for selecting the optimal distribution of seismic stations contributed from existing real‐time broadband national networks in the region.
The Oncogenic Palmitoyl-Protein Network in Prostate Cancer
2011-03-31
network is vulnerable to a diet and drug intervention that will employ a Food and Drug Administration-approved cholesterol-reducing agent ( ezetimibe ...therapeutic value of ezetimibe . 15. SUBJECT TERMS castrate-resistant prostate cancer, palmitoylation, signal transduction, S-acylation 16...that this network might be sensitive to pharmacologic targeting of cholesterol using the cholesterol-lowering drug, ezetimibe . Our hypothesis is that
Game among interdependent networks: The impact of rationality on system robustness
NASA Astrophysics Data System (ADS)
Fan, Yuhang; Cao, Gongze; He, Shibo; Chen, Jiming; Sun, Youxian
2016-12-01
Many real-world systems are composed of interdependent networks that rely on one another. Such networks are typically designed and operated by different entities, who aim at maximizing their own payoffs. There exists a game among these entities when designing their own networks. In this paper, we study the game investigating how the rational behaviors of entities impact the system robustness. We first introduce a mathematical model to quantify the interacting payoffs among varying entities. Then we study the Nash equilibrium of the game and compare it with the optimal social welfare. We reveal that the cooperation among different entities can be reached to maximize the social welfare in continuous game only when the average degree of each network is constant. Therefore, the huge gap between Nash equilibrium and optimal social welfare generally exists. The rationality of entities makes the system inherently deficient and even renders it extremely vulnerable in some cases. We analyze our model for two concrete systems with continuous strategy space and discrete strategy space, respectively. Furthermore, we uncover some factors (such as weakening coupled strength of interdependent networks, designing a suitable topology dependence of the system) that help reduce the gap and the system vulnerability.
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
Analysis of Network Address Shuffling as a Moving Target Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carroll, Thomas E.; Crouse, Michael B.; Fulp, Errin W.
2014-06-10
Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses. Although limited testing has demonstrated it to be effective, little research has been conducted to examine the theoretical limits of address shuffling. As a result, it is difficult to understand how effective shuffling is and under what circumstances it is a viable moving target defense. This paper introduces probabilistic models that can provide insight into the performance of address shuffling. These models quantify the probability of attacker success in terms of network size, quantity of addresses scanned,more » quantity of vulnerable systems, and the frequency of shuffling. Theoretical analysis will show that shuffling is an acceptable defense if there is a small population of vulnerable systems within a large network address space, however shuffling has a cost for legitimate users. These results will also be shown empirically using simulation and actual traffic traces.« less
A Bayesian network to predict vulnerability to sea-level rise: data report
Gutierrez, Benjamin T.; Plant, Nathaniel G.; Thieler, E. Robert
2011-01-01
During the 21st century, sea-level rise is projected to have a wide range of effects on coastal environments, development, and infrastructure. Consequently, there has been an increased focus on developing modeling or other analytical approaches to evaluate potential impacts to inform coastal management. This report provides the data that were used to develop and evaluate the performance of a Bayesian network designed to predict long-term shoreline change due to sea-level rise. The data include local rates of relative sea-level rise, wave height, tide range, geomorphic classification, coastal slope, and shoreline-change rate compiled as part of the U.S. Geological Survey Coastal Vulnerability Index for the U.S. Atlantic coast. In this project, the Bayesian network is used to define relationships among driving forces, geologic constraints, and coastal responses. Using this information, the Bayesian network is used to make probabilistic predictions of shoreline change in response to different future sea-level-rise scenarios.
Tau, amyloid, and cascading network failure across the Alzheimer's disease spectrum.
Jones, David T; Graff-Radford, Jonathan; Lowe, Val J; Wiste, Heather J; Gunter, Jeffrey L; Senjem, Matthew L; Botha, Hugo; Kantarci, Kejal; Boeve, Bradley F; Knopman, David S; Petersen, Ronald C; Jack, Clifford R
2017-12-01
Functionally related brain regions are selectively vulnerable to Alzheimer's disease pathophysiology. However, molecular markers of this pathophysiology (i.e., beta-amyloid and tau aggregates) have discrepant spatial and temporal patterns of progression within these selectively vulnerable brain regions. Existing reductionist pathophysiologic models cannot account for these large-scale spatiotemporal inconsistencies. Within the framework of the recently proposed cascading network failure model of Alzheimer's disease, however, these large-scale patterns are to be expected. This model postulates the following: 1) a tau-associated, circumscribed network disruption occurs in brain regions specific to a given phenotype in clinically normal individuals; 2) this disruption can trigger phenotype independent, stereotypic, and amyloid-associated compensatory brain network changes indexed by changes in the default mode network; 3) amyloid deposition marks a saturation of functional compensation and portends an acceleration of the inciting phenotype specific, and tau-associated, network failure. With the advent of in vivo molecular imaging of tau pathology, combined with amyloid and functional network imaging, it is now possible to investigate the relationship between functional brain networks, tau, and amyloid across the disease spectrum within these selectively vulnerable brain regions. In a large cohort (n = 218) spanning the Alzheimer's disease spectrum from young, amyloid negative, cognitively normal subjects to Alzheimer's disease dementia, we found several distinct spatial patterns of tau deposition, including 'Braak-like' and 'non-Braak-like', across functionally related brain regions. Rather than arising focally and spreading sequentially, elevated tau signal seems to occur system-wide based on inferences made from multiple cross-sectional analyses we conducted looking at regional patterns of tau signal. Younger age-of-disease-onset was associated with 'non-Braak-like' patterns of tau, suggesting an association with atypical clinical phenotypes. As predicted by the cascading network failure model of Alzheimer's disease, we found that amyloid is a partial mediator of the relationship between functional network failure and tau deposition in functionally connected brain regions. This study implicates large-scale brain networks in the pathophysiology of tau deposition and offers support to models incorporating large-scale network physiology into disease models linking tau and amyloid, such as the cascading network failure model of Alzheimer's disease. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Automated Software Vulnerability Analysis
NASA Astrophysics Data System (ADS)
Sezer, Emre C.; Kil, Chongkyung; Ning, Peng
Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.
Predicting and Controlling Complex Networks
2015-06-22
vulnerability and to generate a global view of network security against attacks. By deploying network sensors at particular points in the Internet ...48006, 1-6 (2011). 2 13. L. Huang and Y.-C. Lai, “Cascading dynamics in complex quantum networks,” Chaos 21, 025107, 1-6 (2011). This work was selected...by July 2011 issue of Virtual Journal of Quantum Information (http://www.vjquantuminfo.org). 14. W.-X. Wang, Y.-C. Lai, and D. Armbruster, “Cascading
Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense
2016-12-08
in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully
Cognitive Radio Networks for Tactical Wireless Communications
2014-12-01
exists. Instead, security is an evolving process, as we have seen in the context of WLANs and 2G / 3G networks. New system vulnerabilities continue to...in the network configuration and radio parameters take place due to mobility of platforms, and variation in other users of the RF environment. CRNs...dynamic spectrum access experimentally, and it represents the largest military Mobile Ad hoc Network (MANET) as of today. The WNaN demonstrator has been
Assessing the Climate Resilience of Transport Infrastructure Investments in Tanzania
NASA Astrophysics Data System (ADS)
Hall, J. W.; Pant, R.; Koks, E.; Thacker, S.; Russell, T.
2017-12-01
Whilst there is an urgent need for infrastructure investment in developing countries, there is a risk that poorly planned and built infrastructure will introduce new vulnerabilities. As climate change increases the magnitudes and frequency of natural hazard events, incidence of disruptive infrastructure failures are likely to become more frequent. Therefore, it is important that infrastructure planning and investment is underpinned by climate risk assessment that can inform adaptation planning. Tanzania's rapid economic growth is placing considerable strain on the country's transportation infrastructure (roads, railways, shipping and aviation); especially at the port of Dar es Salaam and its linking transport corridors. A growing number of natural hazard events, in particular flooding, are impacting the reliability of this already over-used network. Here we report on new methodology to analyse vulnerabilities and risks due to failures of key locations in the intermodal transport network of Tanzania, including strategic connectivity to neighboring countries. To perform the national-scale risk analysis we will utilize a system-of-systems methodology. The main components of this general risk assessment, when applied to transportation systems, include: (1) Assembling data on: spatially coherent extreme hazards and intermodal transportation networks; (2) Intersecting hazards with transport network models to initiate failure conditions that trigger failure propagation across interdependent networks; (3) Quantifying failure outcomes in terms of social impacts (customers/passengers disrupted) and/or macroeconomic consequences (across multiple sectors); and (4) Simulating, testing and collecting multiple failure scenarios to perform an exhaustive risk assessment in terms of probabilities and consequences. The methodology is being used to pinpoint vulnerability and reduce climate risks to transport infrastructure investments.
NASA Astrophysics Data System (ADS)
Wang, Jiang; Yang, Chen; Wang, Ruofan; Yu, Haitao; Cao, Yibin; Liu, Jing
2016-10-01
In this paper, EEG series are applied to construct functional connections with the correlation between different regions in order to investigate the nonlinear characteristic and the cognitive function of the brain with Alzheimer's disease (AD). First, limited penetrable visibility graph (LPVG) and phase space method map single EEG series into networks, and investigate the underlying chaotic system dynamics of AD brain. Topological properties of the networks are extracted, such as average path length and clustering coefficient. It is found that the network topology of AD in several local brain regions are different from that of the control group with no statistically significant difference existing all over the brain. Furthermore, in order to detect the abnormality of AD brain as a whole, functional connections among different brain regions are reconstructed based on similarity of clustering coefficient sequence (CCSS) of EEG series in the four frequency bands (delta, theta, alpha, and beta), which exhibit obvious small-world properties. Graph analysis demonstrates that for both methodologies, the functional connections between regions of AD brain decrease, particularly in the alpha frequency band. AD causes the graph index complexity of the functional network decreased, the small-world properties weakened, and the vulnerability increased. The obtained results show that the brain functional network constructed by LPVG and phase space method might be more effective to distinguish AD from the normal control than the analysis of single series, which is helpful for revealing the underlying pathological mechanism of the disease.
ERIC Educational Resources Information Center
Mohammadi, Hadi
2014-01-01
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
T.A. Munoz-Erickson; A.E. Lugo; E. Melendez-Ackerman; L.E. Santiago-Acevedo; J. Seguinot-Barbosa; P. Mendez-Lazaro
2014-01-01
This paper presents initial efforts to establish the San Juan Urban Long-Term Research Area Exploratory (ULTRA-Ex), a long-term program aimed at developing transdisciplinary social-ecological system (SES) research to address vulnerability and sustainability for the municipality of San Juan. Transdisciplinary approaches involve the collaborations between researchers,...
An Analysis of Botnet Vulnerabilities
2007-06-01
Definition Currently, the primary defense against botnets is prompt patching of vulnerable systems and antivirus software . Network monitoring can identify...IRCd software , none were identified during this effort. AFIT iv For my wife, for her caring and support throughout the course of this...are software agents designed to automatically perform tasks. Examples include web-spiders that catalog the Internet and bots found in popular online
Rick G. Kelsey; D. Gallego; F.J. Sánchez-Garcia; J.A. Pajares
2014-01-01
Tree mortality from temperature-driven drought is occurring in forests around the world, often in conjunction with bark beetle outbreaks when carbon allocation to tree defense declines. Physiological metrics for detecting stressed trees with enhanced vulnerability prior to bark beetle attacks remain elusive. Ethanol, water, monoterpene concentrations, and composition...
Lamkin, Joanna; Clifton, Allan; Campbell, W Keith; Miller, Joshua D
2014-04-01
Two dimensions of narcissism exist, grandiose and vulnerable, which are thought to be associated with distinctly different patterns of interpersonal behavior. Social network analysis is a way of quantifying and analyzing interpersonal interactions that may prove useful for characterizing the networks associated with these narcissism dimensions. In the current study, participants (N = 148) completed scales assessing both narcissism dimensions and a measure of the five-factor model of personality. Egocentric network information about participants' 30 closest friends and family members (i.e., "alters") was also obtained. Both narcissism dimensions were characterized by negative perceptions of the individuals who comprise one's social networks, and many of these relations were mediated by individuals' higher levels of antagonism. Grandiose narcissism also interacted with alter centrality (i.e., importance to the network) such that individuals low on grandiose narcissism were less likely to perceive central alters in a negative light and were more attuned to central alters than were individuals high on grandiose narcissism. Overall, both narcissism dimensions were associated with perceiving one's overall social environment negatively because of the high levels of antagonism that characterize both narcissism dimensions. Individuals high on grandiose narcissism, however, appear to be more insensitive to the relative importance of individuals in their social networks. PsycINFO Database Record (c) 2014 APA, all rights reserved
Kowalski, Cláudia Hoffmann; da Silva, Gilmare Antônia; Poppi, Ronei Jesus; Godoy, Helena Teixeira; Augusto, Fabio
2007-02-28
Polychlorinated biphenyls (PCB) can eventually contaminate breast milk, which is a serious issue to the newborn due to their high vulnerability. Solid phase microextraction (SPME) can be a very convenient technique for their isolation and pre-concentration prior chromatographic analysis. Here, a simultaneous multioptimization strategy based on a neuro-genetic approach was applied to a headspace SPME method for determination of 12 PCB in human milk. Gas chromatography with electron capture detection (ECD) was adopted for the separation and detection of the analytes. Experiments according to a Doehlert design were carried out with varied extraction time and temperature, media ionic strength and concentration of the methanol (co-solvent). To find the best model that simultaneously correlate all PCB peak areas and SPME extraction conditions, a multivariate calibration method based on a Bayesian Neural Network (BNN) was applied. The net output from the neural network was used as input in a genetic algorithm (GA) optimization operation (neuro-genetic approach). The GA pointed out that the best values of the overall SPME operational conditions were the saturation of the media with NaCl, extraction temperature of 95 degrees C, extraction time of 60 min and addition of 5% (v/v) methanol to the media. These optimized parameters resulted in the decrease of the detection limits and increase on the sensitivity for all tested analytes, showing that the use of neuro-genetic approach can be a promising way for optimization of SPME methods.
Self-diagnostic thermal protection systems for future spacecraft
NASA Astrophysics Data System (ADS)
Hanlon, Alaina B.
The thermal protection system (TPS) represents the greatest risk factor after propulsion for any transatmospheric mission (Dr. Charles Smith, NASA ARC). Any damage to the TPS leaves the space vehicle vulnerable and could result in the loss of human life as happened in the Columbia accident. Aboard the current Space Shuttle Orbiters no system exists to notify the astronauts or ground control if the thermal protection system has been damaged. Through this research, a proof-of-concept monitoring system was developed. The system has two specific applications for thermal protection systems: (1) Improving models used to predict thermal and mechanical response of TPS materials, and (2) Self-diagnosing damage within regions of the TPS and communicating the damage to the appropriate personnel over a potentially unstable network. Mechanical damage is among the most important things to protect the TPS against. Methods to detect the primary types of mechanical damage suffered by thermal protection systems have been developed. Lightweight, low-power sensors were developed to detect any cracks in small regions of a TPS. Implementation of a network of these sensors within 10's to 1000's of regions will eventually provide high spatial resolution of damage detection; allowing for detection of holes in the TPS. Also important in thermal protection material development is to know the ablation rates and time/temperature response of the materials. A new type of sensor has been developed to monitor temperature at different depths within thermal protection materials. The signals being transmitted through the sensors can be multiplexed to allow for mechanical damage and temperature to be monitored using the same sensor.
NASA Astrophysics Data System (ADS)
Hanson, Jeffrey A.; McLaughlin, Keith L.; Sereno, Thomas J.
2011-06-01
We have developed a flexible, target-driven, multi-modal, physics-based fusion architecture that efficiently searches sensor detections for targets and rejects clutter while controlling the combinatoric problems that commonly arise in datadriven fusion systems. The informational constraints imposed by long lifetime requirements make systems vulnerable to false alarms. We demonstrate that our data fusion system significantly reduces false alarms while maintaining high sensitivity to threats. In addition, mission goals can vary substantially in terms of targets-of-interest, required characterization, acceptable latency, and false alarm rates. Our fusion architecture provides the flexibility to match these trade-offs with mission requirements unlike many conventional systems that require significant modifications for each new mission. We illustrate our data fusion performance with case studies that span many of the potential mission scenarios including border surveillance, base security, and infrastructure protection. In these studies, we deployed multi-modal sensor nodes - including geophones, magnetometers, accelerometers and PIR sensors - with low-power processing algorithms and low-bandwidth wireless mesh networking to create networks capable of multi-year operation. The results show our data fusion architecture maintains high sensitivities while suppressing most false alarms for a variety of environments and targets.
THE IMPACT OF KINSHIP NETWORKS ON OLD-AGE VULNERABILITY IN INDONESIA
Schröder-Butterfill, Elisabeth
2007-01-01
SUMMARY This article examines the problem of care provision for elderly people in Java, a contemporary developing society characterised by lack of formal welfare services, nuclear family organisation and high levels of childlessness. A similar socio-demographic, cultural and economic regime existed in historical Northwest Europe, where it has been seen as having contributed to the early emergence of community based old-age care and low involvement of wider kin networks. Here the role of kin in providing old-age care in a nuclear family system is re-examined by drawing on longitudinal data of elderly people's life histories and support networks in a village in East Java. The central argument is that the identification of elders most vulnerable to a lack of care and support in old age requires understanding the nature and functioning of kin networks over time. The paper discusses three key aspects of networks—network membership, exchanges within networks and network dynamics—and arrives at a characterisation of different kin networks on the basis of size, composition, location and social status. By focusing on the effects of a specific crisis, namely the loss of a wife, on care outcomes in old age, it is possible to determine what kinds of kin networks are best able to adjust to a sudden change in older people's circumstances and protect them from declines in welfare. This reveals the importance, especially for childless elderly people, of extended, heterogeneous and well-connected kin networks. PMID:23750056
Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers
2017-12-01
PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network...AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication ...Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA
Mathematical Approaches to WMD Defense and Vulnerability Assessments of Dynamic Networks
2016-07-01
the last decade, and now tends to focus on a system -wide integration of fortification resources, strategically deployed to...create a robust system of networks. Given the presence of various networks, this goal seeks to determine which edges should be constructed to...controlling all aspects of his actions, with full knowledge of the system , and with the ability to jointly utilize all of
NASA Astrophysics Data System (ADS)
Panthi, J., Sr.
2014-12-01
Climate change vulnerability depends upon various factors and differs between places, sectors and communities. People in developing countries whose subsistence livelihood depends upon agriculture and livestock are identified as particularly vulnerable. Nepal, where the majority of people are in a mixed agro-livestock system, is identified as the world's fourth most vulnerable country to climate change. However, there are few studies on how vulnerable mixed agro-livestock smallholders are and how their vulnerability differs across different ecological regions. This study aims to test two vulnerability assessment indices, livelihood vulnerability index (LVI) and IPCC vulnerability index (VI-IPCC), around the Gandaki river basin of Nepal. A total of 543 households practicing mixed agro-livestock were surveyed from three districts (Dhading, Syangja and Kapilvastu) representing the mountain, mid-hill and lowland altitudinal belts respectively. Data on socio-demographics, livelihoods, social networks, health, food and water security, natural disasters and climate variability were collected. Both indices differed across the three districts, with mixed agro-livestock smallholders of Dhading district found to be the most vulnerable and that of Syangja least vulnerable. This vulnerability index approach may be used to monitor rural vulnerability and/or evaluate potential program/policy effectiveness in poor countries like Nepal. The present findings are intended to help in designing intervention strategies to reduce vulnerability of mixed agro-livestock smallholders and other rural people in developing countries to climate change.
Faculty Social Networking Interactions: Using Social Domain Theory to Assess Student Views
ERIC Educational Resources Information Center
Nemetz, Patricia L.
2012-01-01
As educators consider using social networking sites, like Facebook, for educational innovations, they must be aware of possible vulnerabilities associated with the blurring of social and professional boundaries. This research uses social domain theory to examine how students rate the appropriateness of various faculty postings, behaviors, and…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-28
... network security vulnerabilities and increased risks potentially resulting in unsafe conditions for the... Gulfstream G280 Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized... connectivity of the passenger service computer systems to the airplane critical systems and data networks. The...
dos Reis, Dener Carlos; de Almeida, Thiara Amanda Corrêa; Miranda, Mariane Mendes; Alves, Rodrigo Henrique; Madeira, Anézia Moreira Faria
2013-01-01
to analyze the health vulnerabilities in adolescence associated with socioeconomic conditions, social networks, drugs and violence from the perspective of students. cross-sectional study with 678 students between 14-15 years old in Contagem, Brazil. A self-administered questionnaire divided into modules by subject was used. Quantitative, descriptive and stratified analyses were performed by sex. high percentage of adolescents (40.4%) were beneficiaries of Government financial support called "Bolsa Família" and 14.6% had a job, 57.1% and 23.6% had tried alcohol and tobacco, respectively. We identified 15% of aggression and 26.7% of bullying. The majority informed they never/rarely talk to parents about the daily difficulties (64.5%) and 22% reported insomnia and/or feelings of loneliness. the results indicated that there is a need to intensify educational activities that seek to develop cognitive, affective and social skills aimed at improving the way adolescents face the vulnerabilities, in these activities, nursing has a fundamental role.
NASA Astrophysics Data System (ADS)
Papakosta, Panagiota; Botzler, Sebastian; Krug, Kai; Straub, Daniel
2013-04-01
Mediterranean climate type areas have always been experiencing fire events. However, population growth and expansion of urban centers into wildland areas during the 20th century (expansion of wildland-urban interface) has increased the threat to humans and their activities. Life and property losses, damage on infrastructure and crops, and forest degradation are some of the damages caused by wildfires. Although fires repeatedly occur along the Mediterranean basin, not all areas have experienced severe consequences. The extent of damage by wildfires is influenced by several factors, such as population density, vegetation type, topography, weather conditions and social preparedness [1]. Wildfire consequence estimation by means of vulnerability and exposure indicators is an essential part of wildfire risk analysis. Vulnerability indicators express the conditions that increase the susceptibility of a site to the impact of wildfires and exposure indicators describe the elements at risk [2],[3]. Appropriate indicators to measure wildfire vulnerability and exposure can vary with scale and site. The consequences can be classified into economic, social, environmental and safety, and they can be tangible (human life losses, buildings damaged) or intangible (damage of cultural heritage site). As a consequence, a variety of approaches exist and there is a lack of generalized unified easy-to-implement methodologies. In this study we present a methodology for measuring consequences of wildfires in a Mediterranean area in the mesoscale (1 km² spatial resolution). Vulnerability and exposure indicators covering all consequence levels are identified and their interrelations are stressed. Variables such as building materials, roofing type, and average building values are included in the economic vulnerability level. Safety exposure is expressed by population density, demographic structure, street density and distance to closest fire station. Environmental vulnerability of protected areas and rare species is also included. Presence of cultural heritage sites, power stations and power line network influence social exposure. The conceptual framework is demonstrated with a Bayesian Network (BN). The BN model incorporates empirical observation, physical models and expert knowledge; it can also explicitly account for uncertainty in the indicators. The proposed model is applied to the island of Cyprus. Maps support the demonstration of results. [1] Keeley, J.E.; Bond, W.J.; Bradstock, R.A.; Pausas, J.G.; Rundel, P.W. (2012): Fire in Mediterranean ecosystems: ecology, evolution and management. Cambridge University Press, New York, USA. [2] UN/ISDR (International Strategy for Disaster Reduction (2004): Living with Risk: A Global Review of Disaster Reduction Initiatives, Geneva, UN Publications. [3] Birkmann, J. (2006): Measuring vulnerability to natural hazards: towards disaster resilient societies. United Nations University Press, Tokyo, Japan.
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
NASA Astrophysics Data System (ADS)
Akiyama, Mitsuaki; Iwamura, Makoto; Kawakoya, Yuhei; Aoki, Kazufumi; Itoh, Mitsutaka
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser vulnerabilities is increasing, and a clarification of their methods and countermeasures is urgently needed. In this paper, we introduce the design and implementation of a new client honeypot for drive-by-download attacks that has the capacity to detect and investigate a variety of malicious web sites. On the basis of the problems of existing client honeypots, we enumerate the requirements of a client honeypot: 1) detection accuracy and variety, 2) collection variety, 3) performance efficiency, and 4) safety and stability. We improve our system with regard to these requirements. The key features of our developed system are stepwise detection focusing on exploit phases, multiple crawler processing, tracking of malware distribution networks, and malware infection prevention. Our evaluation of our developed system in a laboratory experiment and field experiment indicated that its detection variety and crawling performance are higher than those of existing client honeypots. In addition, our system is able to collect information for countermeasures and is secure and stable for continuous operation. We conclude that our system can investigate malicious web sites comprehensively and support countermeasures.
Deep Learning for Image-Based Cassava Disease Detection.
Ramcharan, Amanda; Baranowski, Kelsee; McCloskey, Peter; Ahmed, Babuali; Legg, James; Hughes, David P
2017-01-01
Cassava is the third largest source of carbohydrates for human food in the world but is vulnerable to virus diseases, which threaten to destabilize food security in sub-Saharan Africa. Novel methods of cassava disease detection are needed to support improved control which will prevent this crisis. Image recognition offers both a cost effective and scalable technology for disease detection. New deep learning models offer an avenue for this technology to be easily deployed on mobile devices. Using a dataset of cassava disease images taken in the field in Tanzania, we applied transfer learning to train a deep convolutional neural network to identify three diseases and two types of pest damage (or lack thereof). The best trained model accuracies were 98% for brown leaf spot (BLS), 96% for red mite damage (RMD), 95% for green mite damage (GMD), 98% for cassava brown streak disease (CBSD), and 96% for cassava mosaic disease (CMD). The best model achieved an overall accuracy of 93% for data not used in the training process. Our results show that the transfer learning approach for image recognition of field images offers a fast, affordable, and easily deployable strategy for digital plant disease detection.
NASA Astrophysics Data System (ADS)
Freitas, Leonardo; Luiza Coelho Netto, Ana
2017-04-01
An extreme rainfall event took place in the Mountainous Region of the state of Rio de Janeiro in January 2011, causing a catastrophic landslide that resulted in more than 900 deaths and 350 people disappearances. Precipitation events associated with landslides are common in this region and climate change tends to increase the frequency of intense rains and, consequently, landslides. At the same time, the vulnerability of communities has increased as a result of disorderly urban growth. Despite that, before 2011 communities and public power were not prepared to disaster management..After the 2011 event, public authorities try to established policies to reduce these vulnerabilities. One of the communities where the government acted was Córrego Dantas. However, the actions in this place were carried out in a top-down model, without discussion with population. As a consequence, the performance of public power has amplified social vulnerabilities. Highlight for the truculent removal of residents; resettlement in geographically isolated housing complexes; and the establishment of urbanization policies that go against the interests of the residents. The construction of the Córrego d'Aantas Disaster Risk Management Network (REGER-CD), including residents of affected communities, researchers, NGO members and representatives of the public power, is one way to respond these questions. Within this network, the construction of a proposal for a collective contingency plan, articulated with the municipal contingency plan, is generating residents' empowerment, greater adaptation to risks and reducing the vulnerability of Disasters and mass movements
Viljoen, Nadia M; Joubert, Johan W
2018-02-01
This article presents the multilayered complex network formulation for three different supply chain network archetypes on an urban road grid and describes how 500 instances were randomly generated for each archetype. Both the supply chain network layer and the urban road network layer are directed unweighted networks. The shortest path set is calculated for each of the 1 500 experimental instances. The datasets are used to empirically explore the impact that the supply chain's dependence on the transport network has on its vulnerability in Viljoen and Joubert (2017) [1]. The datasets are publicly available on Mendeley (Joubert and Viljoen, 2017) [2].
Vulnerability Analysis and Evaluation of Urban Road System in Tianjin
NASA Astrophysics Data System (ADS)
Liu, Y. Q.; Wu, X.
In recent years, with the development of economy, the road construction of our country has entered into a period of rapid growth. The road transportation network has been expanding and the risk of disasters is increasing. In this paper we study the vulnerability of urban road system in Tianjin. After analyzed many risk factors of the urban road system security, including road construction, road traffic and the natural environment, we proposed an evaluation index of vulnerability of urban road system and established the corresponding evaluation index system. Based on the results of analysis and comprehensive evaluation, appropriate improvement measures and suggestions which may reduce the vulnerability of the road system and improve the safety and reliability of the road system are proposed.
Security Investment in Contagious Networks.
Hasheminasab, Seyed Alireza; Tork Ladani, Behrouz
2018-01-16
Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game-theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost-effective decisions than selfish nonrational or semirational players. © 2018 Society for Risk Analysis.
Application of Satellite Gravimetry for Water Resource Vulnerability Assessment
NASA Technical Reports Server (NTRS)
Rodell, Matthew
2012-01-01
The force of Earth's gravity field varies in proportion to the amount of mass near the surface. Spatial and temporal variations in the gravity field can be measured via their effects on the orbits of satellites. The Gravity Recovery and Climate Experiment (GRACE) is the first satellite mission dedicated to monitoring temporal variations in the gravity field. The monthly gravity anomaly maps that have been delivered by GRACE since 2002 are being used to infer changes in terrestrial water storage (the sum of groundwater, soil moisture, surface waters, and snow and ice), which are the primary source of gravity variability on monthly to decadal timescales after atmospheric and oceanic circulation effects have been removed. Other remote sensing techniques are unable to detect water below the first few centimeters of the land surface. Conventional ground based techniques can be used to monitor terrestrial water storage, but groundwater, soil moisture, and snow observation networks are sparse in most of the world, and the countries that do collect such data rarely are willing to share them. Thus GRACE is unique in its ability to provide global data on variations in the availability of fresh water, which is both vital to life on land and vulnerable to climate variability and mismanagement. This chapter describes the unique and challenging aspects of GRACE terrestrial water storage data, examples of how the data have been used for research and applications related to fresh water vulnerability and change, and prospects for continued contributions of satellite gravimetry to water resources science and policy.
Hoorelbeke, Kristof; Marchetti, Igor; De Schryver, Maarten; Koster, Ernst H W
2016-05-01
Individuals in remission from depression are at increased risk for developing future depressive episodes. Several cognitive risk- and resilience factors have been suggested to account for this vulnerability. In the current study we explored how risk- and protective factors such as cognitive control, adaptive and maladaptive emotion regulation, residual symptomatology, and resilience relate to one another in a remitted depressed (RMD) sample. We examined the relationships between these constructs in a cross-sectional dataset of 69 RMD patients using network analyses in order to obtain a comprehensive, data-driven view on the interplay between these constructs. We subsequently present an association network, a concentration network, and a relative importance network. In all three networks resilience formed the central hub, connecting perceived cognitive control (i.e., working memory complaints), emotion regulation, and residual symptomatology. The contribution of the behavioral measure for cognitive control in the network was negligible. Moreover, the directed relative importance network indicates bidirectional influences between these constructs, with all indicators of centrality suggesting a key role of resilience in remission from depression. The presented findings are cross-sectional and networks are limited to a fixed set of key constructs in the literature pertaining cognitive vulnerability for depression. These findings indicate the importance of resilience to successfully cope with stressors following remission from depression. Further in-depth studies will be essential to identify the specific underlying resilience mechanisms that may be key to successful remission from depression. Copyright © 2016 Elsevier B.V. All rights reserved.
Developing an intelligence analysis process through social network analysis
NASA Astrophysics Data System (ADS)
Waskiewicz, Todd; LaMonica, Peter
2008-04-01
Intelligence analysts are tasked with making sense of enormous amounts of data and gaining an awareness of a situation that can be acted upon. This process can be extremely difficult and time consuming. Trying to differentiate between important pieces of information and extraneous data only complicates the problem. When dealing with data containing entities and relationships, social network analysis (SNA) techniques can be employed to make this job easier. Applying network measures to social network graphs can identify the most significant nodes (entities) and edges (relationships) and help the analyst further focus on key areas of concern. Strange developed a model that identifies high value targets such as centers of gravity and critical vulnerabilities. SNA lends itself to the discovery of these high value targets and the Air Force Research Laboratory (AFRL) has investigated several network measures such as centrality, betweenness, and grouping to identify centers of gravity and critical vulnerabilities. Using these network measures, a process for the intelligence analyst has been developed to aid analysts in identifying points of tactical emphasis. Organizational Risk Analyzer (ORA) and Terrorist Modus Operandi Discovery System (TMODS) are the two applications used to compute the network measures and identify the points to be acted upon. Therefore, the result of leveraging social network analysis techniques and applications will provide the analyst and the intelligence community with more focused and concentrated analysis results allowing them to more easily exploit key attributes of a network, thus saving time, money, and manpower.
Architecture and Methods for Substation SCADA Cybersecurity: Best Practices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Albunashee, Hamdi; Al Sarray, Muthanna; McCann, Roy
There are over 3000 electricity providers in the United States, encompassing investor and publicly owned utilities as well as electric cooperatives. There has been ongoing trends to increasingly automate and provide remote control and monitoring of electric energy delivery systems. The deployment of computer network technologies has increased the efficiency and reliability of electric power infrastructure. However, the increased use of digital communications has also increased the vulnerability to malicious cyber attacks [1]. In 2004 the National Research Councils (National Academies) formed a committee of specialists to address these vulnerabilities and propose possible solutions with an objective to prioritize themore » R&D needs for developing countermeasures. The committee addressed many potential concerns in the electric power delivery system and classified them based upon different criteria and presented recommendations to minimize the gap between the academic research directions and the needs of the electric utility industry. The complexity and diversity of the electric power delivery system in the U.S. has opened many ports for attackers and intruders [1]. This complexity and diversity is attributed to the fact that power delivery system is a network of substations, transmission and distribution lines, sub-networks of controlling, sensing and monitoring units, and human operator involvement for running the system [1]. Accordingly, any incident such as the occurrence of a fault or disturbance in this complex network cannot be deferred and should be resolved within an order of milliseconds, otherwise there is risk of large-scale outages similar to the occurrences in India and the U.S. in 2003 [2]. There are three main vulnerabilities in supervisory control and data acquisition (SCADA) systems commonly identified—physical vulnerability, cyber vulnerability and personal vulnerability [1]. In terms of cyber threats, SCADA systems are the most critical elements in the electric power grid in the U.S. Unauthorized access to a SCADA system could enable/disable unexpected equipment (such as disable the protection system or a circuit breaker) which could cause large scale disruptions of electric power delivery. This paper provides an overview of power system SCADA technologies in transmission substations (Section 2) and summarizes the best practices for implementing a cyber security program. After introducing SCADA system operations in Section 2, a description of the security challenges for SCADA systems is presented in Section 3. In Section 4, NECRC Critical Infrastructure Protection standards CIP-002 through CIP-009 are summarized. An overview of industry best practices is presented in Section 5.« less
Disrupted topology of the resting state structural connectome in middle-aged APOE ε4 carriers.
Korthauer, L E; Zhan, L; Ajilore, O; Leow, A; Driscoll, I
2018-05-24
The apolipoprotein E (APOE) ε4 allele is the best characterized genetic risk factor for Alzheimer's disease to date. Older APOE ε4 carriers (aged 60 + years) are known to have disrupted structural and functional connectivity, but less is known about APOE-associated network integrity in middle age. The goal of this study was to characterize APOE-related differences in network topology in middle age, as disentangling the early effects of healthy versus pathological aging may aid early detection of Alzheimer's disease and inform treatments. We performed resting state functional magnetic resonance imaging (rs-fMRI) and diffusion tensor imaging (DTI) in healthy, cognitively normal, middle-aged adults (age 40-60; N = 76, 38 APOE ε4 carriers). Graph theoretical analysis was used to calculate local and global efficiency of 1) a whole brain rs-fMRI network; 2) a whole brain DTI network; and 3) the resting state structural connectome (rsSC), an integrated functional-structural network derived using functional-by-structural hierarchical (FSH) mapping. Our results indicated no APOE ε4-associated differences in network topology of the rs-fMRI or DTI networks alone. However, ε4 carriers had significantly lower global and local efficiency of the integrated rsSC compared to non-carriers. Furthermore, ε4 carriers were less resilient to targeted node failure of the rsSC, which mimics the neuropathological process of Alzheimer's disease. Collectively, these findings suggest that integrating multiple neuroimaging modalities and employing graph theoretical analysis may reveal network-level vulnerabilities that may serve as biomarkers of age-related cognitive decline in middle age, decades before the onset of overt cognitive impairment. Copyright © 2018. Published by Elsevier Inc.
MERINOVA: Meteorological risks as drivers of environmental innovation in agro-ecosystem management
NASA Astrophysics Data System (ADS)
Gobin, Anne; Oger, Robert; Marlier, Catherine; Van De Vijver, Hans; Vandermeulen, Valerie; Van Huylenbroeck, Guido; Zamani, Sepideh; Curnel, Yannick; Mettepenningen, Evi
2013-04-01
The BELSPO funded project 'MERINOVA' deals with risks associated with extreme weather phenomena and with risks of biological origin such as pests and diseases. The major objectives of the proposed project are to characterise extreme meteorological events, assess the impact on Belgian agro-ecosystems, characterise their vulnerability and resilience to these events, and explore innovative adaptation options to agricultural risk management. The project comprises of five major parts that reflect the chain of risks: (i) Hazard: Assessing the likely frequency and magnitude of extreme meteorological events by means of probability density functions; (ii) Impact: Analysing the potential bio-physical and socio-economic impact of extreme weather events on agro-ecosystems in Belgium using process-based modelling techniques commensurate with the regional scale; (iii) Vulnerability: Identifying the most vulnerable agro-ecosystems using fuzzy multi-criteria and spatial analysis; (iv) Risk Management: Uncovering innovative risk management and adaptation options using actor-network theory and fuzzy cognitive mapping techniques; and, (v) Communication: Communicating to research, policy and practitioner communities using web-based techniques. The different tasks of the MERINOVA project require expertise in several scientific disciplines: meteorology, statistics, spatial database management, agronomy, bio-physical impact modelling, socio-economic modelling, actor-network theory, fuzzy cognitive mapping techniques. These expertises are shared by the four scientific partners who each lead one work package. The MERINOVA project will concentrate on promoting a robust and flexible framework by demonstrating its performance across Belgian agro-ecosystems, and by ensuring its relevance to policy makers and practitioners. Impacts developed from physically based models will not only provide information on the state of the damage at any given time, but also assist in understanding the links between different factors causing damage and determining bio-physical vulnerability. Socio-economic impacts will enlarge the basis for vulnerability mapping, risk management and adaptation options. A strong expert and end-user network will be established to help disseminating and exploiting project results to meet user needs.
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-10-07
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.
Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho
2016-01-01
More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.’s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes. PMID:27739417
Rittman, Timothy; Rubinov, Mikail; Vértes, Petra E; Patel, Ameera X; Ginestet, Cedric E; Ghosh, Boyd C P; Barker, Roger A; Spillantini, Maria Grazia; Bullmore, Edward T; Rowe, James B
2016-12-01
Abnormalities of tau protein are central to the pathogenesis of progressive supranuclear palsy, whereas haplotype variation of the tau gene MAPT influences the risk of Parkinson disease and Parkinson's disease dementia. We assessed whether regional MAPT expression might be associated with selective vulnerability of global brain networks to neurodegenerative pathology. Using task-free functional magnetic resonance imaging in progressive supranuclear palsy, Parkinson disease, and healthy subjects (n = 128), we examined functional brain networks and measured the connection strength between 471 gray matter regions. We obtained MAPT and SNCA microarray expression data in healthy subjects from the Allen brain atlas. Regional connectivity varied according to the normal expression of MAPT. The regional expression of MAPT correlated with the proportionate loss of regional connectivity in Parkinson's disease. Executive cognition was impaired in proportion to the loss of hub connectivity. These effects were not seen with SNCA, suggesting that alpha-synuclein pathology is not mediated through global network properties. The results establish a link between regional MAPT expression and selective vulnerability of functional brain networks to neurodegeneration. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.
2015-05-01
HNW line-of-sight network is mounted on a 10-meter telescoping mast located just aft of the TCN’s cab. The flat plate Range Throughput Extension Kit... TAC – Tactical Command Post ATH – At-the-Halt PoP – Point of Presence SNE – Soldier Network Extension NOSC – Network Operations & Security...Survivability/Lethality Analysis Directorate (ARL/SLAD) conducted a Cooperative Vulnerability and Penetration Assessment on WIN-T Increment 2. The Army
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection
Dai, Huning; Murphy, Christian; Kaiser, Gail
2010-01-01
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations and inputs together with a certain runtime environment. One approach to detecting these vulnerabilities is fuzz testing. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, we present a new testing methodology called Configuration Fuzzing. Configuration Fuzzing is a technique whereby the configuration of the running application is mutated at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks “security invariants” that, if violated, indicate a vulnerability. We discuss the approach and introduce a prototype framework called ConFu (CONfiguration FUzzing testing framework) for implementation. We also present the results of case studies that demonstrate the approach’s feasibility and evaluate its performance. PMID:21037923
Setting Priorities in Behavioral Interventions: An Application to Reducing Phishing Risk.
Canfield, Casey Inez; Fischhoff, Baruch
2018-04-01
Phishing risk is a growing area of concern for corporations, governments, and individuals. Given the evidence that users vary widely in their vulnerability to phishing attacks, we demonstrate an approach for assessing the benefits and costs of interventions that target the most vulnerable users. Our approach uses Monte Carlo simulation to (1) identify which users were most vulnerable, in signal detection theory terms; (2) assess the proportion of system-level risk attributable to the most vulnerable users; (3) estimate the monetary benefit and cost of behavioral interventions targeting different vulnerability levels; and (4) evaluate the sensitivity of these results to whether the attacks involve random or spear phishing. Using parameter estimates from previous research, we find that the most vulnerable users were less cautious and less able to distinguish between phishing and legitimate emails (positive response bias and low sensitivity, in signal detection theory terms). They also accounted for a large share of phishing risk for both random and spear phishing attacks. Under these conditions, our analysis estimates much greater net benefit for behavioral interventions that target these vulnerable users. Within the range of the model's assumptions, there was generally net benefit even for the least vulnerable users. However, the differences in the return on investment for interventions with users with different degrees of vulnerability indicate the importance of measuring that performance, and letting it guide interventions. This study suggests that interventions to reduce response bias, rather than to increase sensitivity, have greater net benefit. © 2017 Society for Risk Analysis.
Molet, Jenny; Maras, Pamela M; Kinney-Lang, Eli; Harris, Neil G; Rashid, Faisal; Ivy, Autumn S; Solodkin, Ana; Obenaus, Andre; Baram, Tallie Z
2016-12-01
Memory and related cognitive functions are progressively impaired in a subgroup of individuals experiencing childhood adversity and stress. However, it is not possible to identify vulnerable individuals early, a crucial step for intervention. In this study, high-resolution magnetic resonance imaging (MRI) and intra-hippocampal diffusion tensor imaging (DTI) were employed to examine for structural signatures of cognitive adolescent vulnerabilities in a rodent model of early-life adversity. These methods were complemented by neuroanatomical and functional assessments of hippocampal network integrity during adolescence, adulthood and middle-age. The high-resolution MRI identified selective loss of dorsal hippocampal volume, and intra-hippocampal DTI uncovered disruption of dendritic structure, consistent with disrupted local connectivity, already during late adolescence in adversity-experiencing rats. Memory deteriorated over time, and stunting of hippocampal dendritic trees was apparent on neuroanatomical analyses. Thus, disrupted hippocampal neuronal structure and connectivity, associated with cognitive impairments, are detectable via non-invasive imaging modalities in rats experiencing early-life adversity. These high-resolution imaging approaches may constitute promising tools for prediction and assessment of at-risk individuals in the clinic. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Ouchi, Kei; Lindvall, Charlotta; Chai, Peter R; Boyer, Edward W
2018-06-01
Adverse drug events (ADEs) are common and have serious consequences in older adults. ED visits are opportunities to identify and alter the course of such vulnerable patients. Current practice, however, is limited by inaccurate reporting of medication list, time-consuming medication reconciliation, and poor ADE assessment. This manuscript describes a novel approach to predict, detect, and intervene vulnerable older adults at risk of ADE using machine learning. Toxicologists' expertise in ADE is essential to creating the machine learning algorithm. Leveraging the existing electronic health records to better capture older adults at risk of ADE in the ED may improve their care.
Always Wanted to Hack the Pentagon? DoD Says Bring It
test and find vulnerabilities in the department's applications, websites and networks, he added Resolve/Foal Eagle 2010, a joint U.S. and South Korean command-post exercise with computer-based command-post exercise with computer-based simulations and field exercises. Cook said other networks
Managing a User’s Vulnerability on a Social Networking Site
2015-05-01
aid not only the cyberbullying of teenagers but also the cyberstalking and cyberharassment of adults3. On a social networking site, an individual user...news/2011-07-23-facebook-stalker- sentenced_n.htm 3en.wikipedia.org/wiki/ Cyberbullying 1 posts and subsequent interactions. The owner of the site
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... regular security audits and have been certified for operation. The CPSC observes all industry and Federal government best practices for network security. CPSC staff regularly analyzes its systems for vulnerabilities and malware, and monitor the network for real-time intrusion attempts. B. Estimated Burden The CPSC...
Blessed Oblivion? Knowledge and Metacognitive Accuracy in Online Social Networks
ERIC Educational Resources Information Center
Moll, Ricarda; Pieschl, Stephanie; Bromme, Rainer
2015-01-01
In order to reap the social gratifications of Online Social Networks (OSNs), users often disclose self-related information, making them potentially vulnerable to their online audiences. We give a brief overview of our theoretical ideas and empirical research about additional cognitive and metacognitive factors relevant for the perception of risk…
Opsahl, Stephen P.; Musgrove, MaryLynn; Mahler, Barbara J.; Lambert, Rebecca B.
2018-06-07
As questions regarding the influence of increasing urbanization on water quality in the Edwards aquifer are raised, a better understanding of the sources, fate, and transport of compounds of concern in the aquifer—in particular, nutrients and pesticides—is needed to improve water management decision-making capabilities. The U.S. Geological Survey, in cooperation with the San Antonio Water System, performed a study from 2010 to 2016 to better understand how water quality changes under a range of hydrologic conditions and in contrasting land-cover settings (rural and urban) in the Edwards aquifer. The study design included continuous hydrologic monitoring, continuous water-quality monitoring, and discrete sample collection for a detailed characterization of water quality at a network of sites throughout the aquifer system. The sites were selected to encompass a “source-to-sink” (that is, from aquifer recharge to aquifer discharge) approach. Network sites were selected to characterize rainfall, recharging surface water, and groundwater; groundwater sites included wells in the unconfined part of the aquifer (unconfined wells) and in the confined part of the aquifer (confined wells) and a major discharging spring. Storm-related samples—including rainfall samples, stormwater-runoff (surface-water) samples, and groundwater samples—were collected to characterize the aquifer response to recharge.Elevated nitrate concentrations relative to national background values and the widespread detection of pesticides indicate that the Edwards aquifer is vulnerable to contamination and that vulnerability is affected by factors such as land cover, aquifer hydrogeology, and changes in hydrologic conditions. Greater vulnerability of groundwater in urban areas relative to rural areas was evident from results for urban groundwater sites, which generally had higher nitrate concentrations, elevated δ15N-nitrate values, a greater diversity of pesticides, and higher pesticide concentrations. The continuum of water quality from unconfined rural groundwater sites (least affected by anthropogenic contamination) to unconfined urban groundwater sites (most affected by anthropogenic contamination) demonstrates enhanced vulnerability of urban versus rural land cover. Differences in contaminant occurrences and concentration among unconfined urban wells indicate that the urban parts of the aquifer are not uniformly vulnerable, but rather are affected by spatial differences in the sources of nutrients and pesticides. In urban areas, the shallow, unconfined groundwater sites showed greater temporal variability in both nutrient and pesticide concentrations, as well as a greater degree of contamination, than did deeper, confined groundwater sites. In comparison to that of the shallow, unconfined groundwater sites, the water quality of the deeper, confined groundwater sites was relatively invariant during this multiyear study. Although aquifer hydrogeology is an important factor related to aquifer vulnerability, land cover likely has a greater influence on pesticide contamination of groundwater. Temporal variability in hydrologic conditions for the Edwards aquifer is apparent in data for surface water as a source of groundwater recharge, water-level altitude in wells, spring discharge, and groundwater quality. This temporal variability affects recharge sources, recharge amounts, groundwater traveltimes, flow routing, water-rock interaction processes, dilution, mixing, and, in turn, water quality. Relations of land cover, aquifer hydrogeology, and changing hydrologic conditions to water quality are complex but provide insight into the vulnerability of Edwards aquifer groundwater—a vital drinking-water resource.
Modeling the Propagation of Mobile Phone Virus under Complex Network
Yang, Wei; Wei, Xi-liang; Guo, Hao; An, Gang; Guo, Lei
2014-01-01
Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation models of mobile phone viruses under the complex network are proposed in this paper. One is intended to describe the propagation of user-tricking virus, and the other is to describe the propagation of the vulnerability-exploiting virus. Based on the traditional epidemic models, the characteristics of mobile phone viruses and the network topology structure are incorporated into our models. A detailed analysis is conducted to analyze the propagation models. Through analysis, the stable infection-free equilibrium point and the stability condition are derived. Finally, considering the network topology, the numerical and simulation experiments are carried out. Results indicate that both models are correct and suitable for describing the spread of two different mobile phone viruses, respectively. PMID:25133209
Shock waves on complex networks
NASA Astrophysics Data System (ADS)
Mones, Enys; Araújo, Nuno A. M.; Vicsek, Tamás; Herrmann, Hans J.
2014-05-01
Power grids, road maps, and river streams are examples of infrastructural networks which are highly vulnerable to external perturbations. An abrupt local change of load (voltage, traffic density, or water level) might propagate in a cascading way and affect a significant fraction of the network. Almost discontinuous perturbations can be modeled by shock waves which can eventually interfere constructively and endanger the normal functionality of the infrastructure. We study their dynamics by solving the Burgers equation under random perturbations on several real and artificial directed graphs. Even for graphs with a narrow distribution of node properties (e.g., degree or betweenness), a steady state is reached exhibiting a heterogeneous load distribution, having a difference of one order of magnitude between the highest and average loads. Unexpectedly we find for the European power grid and for finite Watts-Strogatz networks a broad pronounced bimodal distribution for the loads. To identify the most vulnerable nodes, we introduce the concept of node-basin size, a purely topological property which we show to be strongly correlated to the average load of a node.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shekar, Venkateswaran; Fiondella, Lance; Chatterjee, Samrat
Several transportation network vulnerability models have been proposed. However, most only consider disruptions as a static snapshot in time and the impact on total travel time. These approaches cannot consider the time-varying nature of travel demand nor other undesirable outcomes that follow from transportation network disruptions. This paper proposes an algorithmic approach to assess the vulnerability of a transportation network that considers the time-varying demand with an open source dynamic transportation simulation tool. The open source nature of the tool allows us to systematically consider many disruption scenarios and quantitatively compare their relative criticality. This is far more efficient thanmore » traditional approaches which would require days or weeks of a transportation engineers time to manually set up, run, and assess these simulations. In addition to travel time, we also collect statistics on additional fuel consumed and the corresponding carbon dioxide emissions. Our approach, thus provides a more systematic approach that is both time-varying and can consider additional negative consequences of disruptions for decision makers to evaluate.« less
An improved anonymous authentication scheme for roaming in ubiquitous networks.
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
An improved anonymous authentication scheme for roaming in ubiquitous networks
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575
A Framework for Programming and Budgeting for Cybersecurity
2016-01-01
environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol
2015-02-01
not normally blocked by enterprise firewalls . • Some malware exploited zero-day vulnerabilities as well as attempted to exploit vulnerabilities for...servers, receiving updates, and exfiltrating data. Firewalls are routinely configured to block incoming connections while malware within a target...implemented with layers of technical security controls (e.g., ICS-aware firewalls ) to control network traffic and prevent the spread of malware . Intrusion
Potential System Vulnerabilities of a Network Enabled Force
2004-09-01
of trust in information, loss of context and awareness of others’ needs and reduction of social cohesion . Science - (more specifically systems...and Technology Damaging Social Cohesion NCW champions the concept of dispersed forces as a means to generate effects through approaches other than...Mission Grouping Damaging Social Cohesion This is a slight variation on the vulnerability expressed in 3.9.6 above. If we have agility in mission
De Pietri, Diana; Dietrich, Patricia; Mayo, Patricia; Carcagno, Alejandro; de Titto, Ernesto
2013-12-01
Characterize geographical indicators in relation to their usefulness in measuring regional inequities, identify and describe areas according to their degree of geographical accessibility to primary health care centers (PHCCs), and detect populations at risk from the perspective of access to primary care. Analysis of spatial accessibility using geographic information systems (GIS) involved three aspects: population without medical coverage, distribution of PHCCs, and the public transportation network connecting them. The development of indicators of demand (real, potential, and differential) and analysis of territorial factors affecting population mobility enabled the characterization of PHCCs with regard to their environment, thereby contributing to local and regional analysis and to the detection of different zones according to regional connectivity levels. Indicators developed in a GIS environment were very useful in analyzing accessibility to PHCCs by vulnerable populations. Zoning the region helped identify inequities by differentiating areas of unmet demand and fragmentation of spatial connectivity between PHCCs and public transportation.
Nuclear pulse. II - Ensuring delivery of the doomsday signal
NASA Astrophysics Data System (ADS)
Broad, W. J.
1981-06-01
The ability of the communications systems on which U.S. strategic forces depend to survive the electromagnetic pulse (EMP) effects of a nuclear blast in the upper atmosphere is examined. It is shown that the Bell system telephone network, Autovon, on which much military communication presently depends, is especially vulnerable to EMP; while satellite and microwave communications networks are expected to be more resistant to attack. Satellites are, though, vulnerable to killer-satellite attack. Much promise is seen in the conversion of ground communications links to fiber-optic form, which is inherently highly resistant to EMP. A nuclear bomb detonated 200 miles above Nebraska would affect communications equipment throughout the contiguous U.S. with peak fields of 500,000 volts/meter.
Summary of vulnerability related technologies based on machine learning
NASA Astrophysics Data System (ADS)
Zhao, Lei; Chen, Zhihao; Jia, Qiong
2018-04-01
As the scale of information system increases by an order of magnitude, the complexity of system software is getting higher. The vulnerability interaction from design, development and deployment to implementation stages greatly increases the risk of the entire information system being attacked successfully. Considering the limitations and lags of the existing mainstream security vulnerability detection techniques, this paper summarizes the development and current status of related technologies based on the machine learning methods applied to deal with massive and irregular data, and handling security vulnerabilities.
Collecting data to evaluate the effect of health policies on vulnerable populations.
Bindman, A B; Grumbach, K; Keane, D; Lurie, N
1993-02-01
Public health policies often have disproportionate effects on the poor and other vulnerable groups. Standard survey techniques are often difficult to apply to these vulnerable populations, and many data bases systematically omit such individuals. The purpose of this paper is to review our experience in collecting primary survey data from public hospital, mentally ill, HIV-infected, and non-English-speaking patients. Important issues in conducting research on these populations include proper selection of subjects and comparison groups and difficulties involved in recruitment and enrollment of subjects. Maintaining longitudinal data on these populations is difficult and often requires tracking, secondary contacts, home visits and community outreach, and the use of organizations, institutions, and networks. Investigators must also pay careful attention to ethical issues involved in conducting research on vulnerable populations.
An Epidemiological Network Model for Disease Outbreak Detection
Reis, Ben Y; Kohane, Isaac S; Mandl, Kenneth D
2007-01-01
Background Advanced disease-surveillance systems have been deployed worldwide to provide early detection of infectious disease outbreaks and bioterrorist attacks. New methods that improve the overall detection capabilities of these systems can have a broad practical impact. Furthermore, most current generation surveillance systems are vulnerable to dramatic and unpredictable shifts in the health-care data that they monitor. These shifts can occur during major public events, such as the Olympics, as a result of population surges and public closures. Shifts can also occur during epidemics and pandemics as a result of quarantines, the worried-well flooding emergency departments or, conversely, the public staying away from hospitals for fear of nosocomial infection. Most surveillance systems are not robust to such shifts in health-care utilization, either because they do not adjust baselines and alert-thresholds to new utilization levels, or because the utilization shifts themselves may trigger an alarm. As a result, public-health crises and major public events threaten to undermine health-surveillance systems at the very times they are needed most. Methods and Findings To address this challenge, we introduce a class of epidemiological network models that monitor the relationships among different health-care data streams instead of monitoring the data streams themselves. By extracting the extra information present in the relationships between the data streams, these models have the potential to improve the detection capabilities of a system. Furthermore, the models' relational nature has the potential to increase a system's robustness to unpredictable baseline shifts. We implemented these models and evaluated their effectiveness using historical emergency department data from five hospitals in a single metropolitan area, recorded over a period of 4.5 y by the Automated Epidemiological Geotemporal Integrated Surveillance real-time public health–surveillance system, developed by the Children's Hospital Informatics Program at the Harvard-MIT Division of Health Sciences and Technology on behalf of the Massachusetts Department of Public Health. We performed experiments with semi-synthetic outbreaks of different magnitudes and simulated baseline shifts of different types and magnitudes. The results show that the network models provide better detection of localized outbreaks, and greater robustness to unpredictable shifts than a reference time-series modeling approach. Conclusions The integrated network models of epidemiological data streams and their interrelationships have the potential to improve current surveillance efforts, providing better localized outbreak detection under normal circumstances, as well as more robust performance in the face of shifts in health-care utilization during epidemics and major public events. PMID:17593895
Iguacel, Isabel; Fernández-Alvira, Juan M; Bammann, Karin; De Clercq, Bart; Eiben, Gabriele; Gwozdz, Wencke; Molnar, Dénes; Pala, Valeria; Papoutsou, Stalo; Russo, Paola; Veidebaum, Toomas; Wolters, Maike; Börnhorst, Claudia; Moreno, Luis A
2016-10-01
Socio-economic inequalities in childhood can determine dietary patterns, and therefore future health. This study aimed to explore associations between social vulnerabilities and dietary patterns assessed at two time points, and to investigate the association between accumulation of vulnerabilities and dietary patterns. A total of 9301 children aged 2-9 years participated at baseline and 2-year follow-up examinations of the Identification and prevention of Dietary- and lifestyle-induced health EFfects In Children and infantS study. In all, three dietary patterns were identified at baseline and follow-up by applying the K-means clustering algorithm based on a higher frequency of consumption of snacks and fast food (processed), sweet foods and drinks (sweet), and fruits and vegetables (healthy). Vulnerable groups were defined at baseline as follows: children whose parents lacked a social network, children from single-parent families, children of migrant origin and children with unemployed parents. Multinomial mixed models were used to assess the associations between social vulnerabilities and children's dietary patterns at baseline and follow-up. Children whose parents lacked a social network (OR 1·31; 99 % CI 1·01, 1·70) and migrants (OR 1·45; 99 % CI 1·15, 1·83) were more likely to be in the processed cluster at baseline and follow-up. Children whose parents were homemakers (OR 0·74; 99 % CI 0·60, 0·92) were less likely to be in the processed cluster at baseline. A higher number of vulnerabilities was associated with a higher probability of children being in the processed cluster (OR 1·78; 99 % CI 1·21, 2·62). Therefore, special attention should be paid to children of vulnerable groups as they present unhealthier dietary patterns.
ERIC Educational Resources Information Center
Conley-Ware, Lakita D.
2010-01-01
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?
Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn
2015-10-23
Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.
Virtual water trade and country vulnerability: A network perspective
NASA Astrophysics Data System (ADS)
Sartori, Martina; Schiavo, Stefano
2015-04-01
This work investigates the relationship between countries' participation in virtual water trade and their vulnerability to external shocks from a network perspective. In particular, we investigate whether (i) possible sources of local national crises may interact with the system, propagating through the network and affecting the other countries involved; (ii) the topological characteristics of the international agricultural trade network, translated into virtual water-equivalent flows, may favor countries' vulnerability to external crises. Our work contributes to the debate on the potential merits and risks associated with openness to trade in agricultural and food products. On the one hand, trade helps to ensure that even countries with limited water (and other relevant) resources have access to sufficient food and contribute to the global saving of water. On the other hand, there are fears that openness may increase the vulnerability to external shocks and thus make countries worse off. Here we abstract from political considerations about food sovereignty and independence from imports and focus instead on investigating whether the increased participation in global trade that the world has witnessed in the last 30 years has made the system more susceptible to large shocks. Our analysis reveals that: (i) the probability of larger supply shocks has not increased over time; (ii) the topological characteristics of the VW network are not such as to favor the systemic risk associated with shock propagation; and (iii) higher-order interconnections may reveal further important information about the structure of a network. Regarding the first result, fluctuations in output volumes, among the sources of shock analyzed here, are more likely to generate some instability. The first implication is that, on one side, past national or regional economic crises were not necessarily brought about or strengthened by global trade. The second, more remarkable, implication is that, on the other side, supporting a national policy of self-sufficiency in food production while progressively reducing the participation in international agricultural trade does not necessarily protect a country from economic instability. Moreover, it is well established in the literature that, over time, international food trade has favored more efficient use of water resources, at the global level. This fact, together with our conclusions, highlights the important role of international trade in driving the efficient allocation of water resources. To sum up, our evidence reveals that the increased globalization witnessed in the last 30 years is not associated with an increased frequency of adverse shocks (in either precipitation or food production). Furthermore, building on recent advances in network analysis that connect the stability of a complex system to the interaction between the distribution of shocks and the network topology, we find that the world is more interconnected, but not necessarily less stable.
Guaranteeing Spoof-Resilient Multi-Robot Networks
2015-05-12
particularly challenging attack on this assumption is the so-called “Sybil attack.” In a Sybil attack a malicious agent can generate (or spoof) a large...cybersecurity in general multi-node networks (e.g. a wired LAN), the same is not true for multi- robot networks [14, 28], leaving them largely vulnerable...key passing or cryptographic authen- tication is difficult to maintain due to the highly dynamic and distributed nature of multi-robot teams where
A Bayesian Network to Predict Barrier Island Geomorphologic Characteristics
NASA Astrophysics Data System (ADS)
Gutierrez, B.; Plant, N. G.; Thieler, E. R.; Turecek, A.; Stippa, S.
2014-12-01
Understanding how barrier islands along the Atlantic and Gulf coasts of the United States respond to storms and sea-level rise is an important management concern. Although these threats are well recognized, quantifying the integrated vulnerability is challenging due to the range of time and space scalesover which these processes act. Developing datasets and methods to identify the physical vulnerabilities of coastal environments due to storms and sea-level rise thus is an important scientific focus that supports land management decision making. Here we employ a Bayesian Network (BN) to model the interactions between geomorphic variables sampled from existing datasets that capture both storm-and sea-level rise related coastal evolution. The BN provides a means of estimating probabilities of changes in specific geomorphic characteristics such as foredune crest height, beach width, beach height, given knowledge of barrier island width, maximum barrier island elevation, distance from an inlet, the presence of anthropogenic modifications, and long-term shoreline change rates, which we assume to be directly related to sea-level rise. We evaluate BN skill and explore how different constraints, such as shoreline change characteristics (eroding, stable, accreting), distance to nearby inlets and island width, affect the probability distributions of future morphological characteristics. Our work demonstrates that a skillful BN can be constructed and that factors such as distance to inlet, shoreline change rate, and the presence of human alterations have the strongest influences on network performance. For Assateague Island, Maryland/Virginia, USA, we find that different shoreline change behaviors affect the probabilities of specific geomorphic characteristics, such as dune height, which allows us to identify vulnerable locations on the barrier island where habitat or infrastructure may be vulnerable to storms and sea-level rise.
NASA Astrophysics Data System (ADS)
Legro, J. R.; Abi-Samra, N. C.; Tesche, F. M.
1985-05-01
In addition to the initial transients designated as fast transient high-altitude EMP (HEMP) and intermediate time EMP, electromagnetic signals are also perceived at times from seconds to hundreds of seconds after a high-altitude nuclear burst. This signal was defined by the term magnetohydrodynamic-electromagnetic pulse (MHD-EMP). The MHD-EMP phenomena was detected in actual weapon tests and predicted from theoretical models. A preliminary research effort to investigate the nature and coupling of the MHD-EMP environments to electric power systems documented the construction of approximate system response network models, and the development of a unified methodology to assess equipment and systematic vulnerability are defined. The MHD-EMP environment is compared to a qualitatively similar natural event, the electromagnetic environment produced by geomagnetic storms.
Complex networks in confined comminution
NASA Astrophysics Data System (ADS)
Walker, David M.; Tordesillas, Antoinette; Einav, Itai; Small, Michael
2011-08-01
The physical process of confined comminution is investigated within the framework of complex networks. We first characterize the topology of the unweighted contact networks as generated by the confined comminution process. We find this process gives rise to an ultimate contact network which exhibits a scale-free degree distribution and small world properties. In particular, if viewed in the context of networks through which information travels along shortest paths, we find that the global average of the node vulnerability decreases as the comminution process continues, with individual node vulnerability correlating with grain size. A possible application to the design of synthetic networks (e.g., sensor networks) is highlighted. Next we turn our attention to the physics of the granular comminution process and examine force transmission with respect to the weighted contact networks, where each link is weighted by the inverse magnitude of the normal force acting at the associated contact. We find that the strong forces (i.e., force chains) are transmitted along pathways in the network which are mainly following shortest-path routing protocols, as typically found, for example, in communication systems. Motivated by our earlier studies of the building blocks for self-organization in dense granular systems, we also explore the properties of the minimal contact cycles. The distribution of the contact strain energy intensity of 4-cycle motifs in the ultimate state of the confined comminution process is shown to be consistent with a scale-free distribution with infinite variance, thereby suggesting that 4-cycle arrangements of grains are capable of storing vast amounts of energy in their contacts without breaking.
Power laws and fragility in flow networks.
Shore, Jesse; Chu, Catherine J; Bianchi, Matt T
2013-01-01
What makes economic and ecological networks so unlike other highly skewed networks in their tendency toward turbulence and collapse? Here, we explore the consequences of a defining feature of these networks: their nodes are tied together by flow. We show that flow networks tend to the power law degree distribution (PLDD) due to a self-reinforcing process involving position within the global network structure, and thus present the first random graph model for PLDDs that does not depend on a rich-get-richer function of nodal degree. We also show that in contrast to non-flow networks, PLDD flow networks are dramatically more vulnerable to catastrophic failure than non-PLDD flow networks, a finding with potential explanatory power in our age of resource- and financial-interdependence and turbulence.
Daniel J. Isaak; Charles H. Luce; Bruce E. Rieman; David E. Nagel; Erin E. Peterson; Dona L. Horan; Sharon Parkes; Gwynne L. Chandler
2010-01-01
Mountain streams provide important habitats for many species, but their faunas are especially vulnerable to climate change because of ectothermic physiologies and movements that are constrained to linear networks that are easily fragmented. Effectively conserving biodiversity in these systems requires accurate downscaling of climatic trends to local habitat conditions...
Ibrahim, George M; Cassel, Daniel; Morgan, Benjamin R; Smith, Mary Lou; Otsubo, Hiroshi; Ochi, Ayako; Taylor, Margot; Rutka, James T; Snead, O Carter; Doesburg, Sam
2014-10-01
The effects of interictal epileptiform discharges on neurocognitive development in children with medically-intractable epilepsy are poorly understood. Such discharges may have a deleterious effect on the brain's intrinsic connectivity networks, which reflect the organization of functional networks at rest, and in turn on neurocognitive development. Using a combined functional magnetic resonance imaging-magnetoencephalography approach, we examine the effects of interictal epileptiform discharges on intrinsic connectivity networks and neurocognitive outcome. Functional magnetic resonance imaging was used to determine the location of regions comprising various intrinsic connectivity networks in 26 children (7-17 years), and magnetoencephalography data were reconstructed from these locations. Inter-regional phase synchronization was then calculated across interictal epileptiform discharges and graph theoretical analysis was applied to measure event-related changes in network topology in the peri-discharge period. The magnitude of change in network topology (network resilience/vulnerability) to interictal epileptiform discharges was associated with neurocognitive outcomes and functional magnetic resonance imaging networks using dual regression. Three main findings are reported: (i) large-scale network changes precede and follow interictal epileptiform discharges; (ii) the resilience of network topologies to interictal discharges is associated with stronger resting-state network connectivity; and (iii) vulnerability to interictal discharges is associated with worse neurocognitive outcomes. By combining the spatial resolution of functional magnetic resonance imaging with the temporal resolution of magnetoencephalography, we describe the effects of interictal epileptiform discharges on neurophysiological synchrony in intrinsic connectivity networks and establish the impact of interictal disruption of functional networks on cognitive outcome in children with epilepsy. The association between interictal discharges, network changes and neurocognitive outcomes suggests that it is of clinical importance to suppress discharges to foster more typical brain network development in children with focal epilepsy. © The Author (2014). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A Methodology for Assessing the Seismic Vulnerability of Highway Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cirianni, Francis; Leonardi, Giovanni; Scopelliti, Francesco
2008-07-08
Modern society is totally dependent on a complex and articulated infrastructure network of vital importance for the existence of the urban settlements scattered on the territory. On these infrastructure systems, usually indicated with the term lifelines, are entrusted numerous services and indispensable functions of the normal urban and human activity.The systems of the lifelines represent an essential element in all the urbanised areas which are subject to seismic risk. It is important that, in these zones, they are planned according to opportune criteria based on two fundamental assumptions: a) determination of the best territorial localization, avoiding, within limits, the placesmore » of higher dangerousness; b) application of constructive technologies finalized to the reduction of the vulnerability.Therefore it is indispensable that in any modern process of seismic risk assessment the study of the networks is taken in the rightful consideration, to be integrated with the traditional analyses of the buildings.The present paper moves in this direction, dedicating particular attention to one kind of lifeline: the highway system, proposing a methodology of analysis finalized to the assessment of the seismic vulnerability of the system.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinthavali, Supriya
Surface transportation road networks share structural properties similar to other complex networks (e.g., social networks, information networks, biological networks, and so on). This research investigates the structural properties of road networks for any possible correlation with the traffic characteristics such as link flows those determined independently. Additionally, we define a criticality index for the links of the road network that identifies the relative importance in the network. We tested our hypotheses with two sample road networks. Results show that, correlation exists between the link flows and centrality measures of a link of the road (dual graph approach is followed) andmore » the criticality index is found to be effective for one test network to identify the vulnerable nodes.« less
Software Vulnerability Taxonomy Consolidation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polepeddi, Sriram S.
2004-12-07
In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of amore » particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data, which would be of use to system administrators, software developers and vulnerability researchers is not yet achieved, this work has resulted in the most exhaustive collection of vulnerability data to date.« less
Huusom, Henrik; Strange, Niels
2008-04-01
The theoretical concept, "asset specificity," is applied to real data in the context of Danish nature conservation network planning in order to produce illustrative examples of an economic measure of the network's vulnerability to exogenous shocks to the species composition. Three different measures of asset specificity are quantified from the shadow value of eliminating a key species from the individual grid cells. This represents a novel approach and a different interpretation of the term, as it is conventionally used as a qualitative indicator in the transaction cost economics literature. Apart from supplementing existing cost measures with an indicator of risk associated with investments in protected areas, this study demonstrates how the estimation and interpretation of various asset specificity measures for geographical areas may qualify policy makers' choice of policy instrument in conservation planning. This differs from the more intuitive approach of basing policy instrument choice solely on the rarity of the species in a given area.
Network-Physics(NP) Bec DIGITAL(#)-VULNERABILITY Versus Fault-Tolerant Analog
NASA Astrophysics Data System (ADS)
Alexander, G. K.; Hathaway, M.; Schmidt, H. E.; Siegel, E.
2011-03-01
Siegel[AMS Joint Mtg.(2002)-Abs.973-60-124] digits logarithmic-(Newcomb(1881)-Weyl(1914; 1916)-Benford(1938)-"NeWBe"/"OLDbe")-law algebraic-inversion to ONLY BEQS BEC:Quanta/Bosons= digits: Synthesis reveals EMP-like SEVERE VULNERABILITY of ONLY DIGITAL-networks(VS. FAULT-TOLERANT ANALOG INvulnerability) via Barabasi "Network-Physics" relative-``statics''(VS.dynamics-[Willinger-Alderson-Doyle(Not.AMS(5/09)]-]critique); (so called)"Quantum-computing is simple-arithmetic(sans division/ factorization); algorithmic-complexities: INtractibility/ UNdecidability/ INefficiency/NONcomputability / HARDNESS(so MIScalled) "noise"-induced-phase-transitions(NITS) ACCELERATION: Cook-Levin theorem Reducibility is Renormalization-(Semi)-Group fixed-points; number-Randomness DEFINITION via WHAT? Query(VS. Goldreich[Not.AMS(02)] How? mea culpa)can ONLY be MBCS "hot-plasma" versus digit-clumping NON-random BEC; Modular-arithmetic Congruences= Signal X Noise PRODUCTS = clock-model; NON-Shor[Physica A,341,586(04)] BEC logarithmic-law inversion factorization:Watkins number-thy. U stat.-phys.); P=/=NP TRIVIAL Proof: Euclid!!! [(So Miscalled) computational-complexity J-O obviation via geometry.
Marchetti, Igor; Koster, Ernst H W; Sonuga-Barke, Edmund J; De Raedt, Rudi
2012-09-01
A neurobiological account of cognitive vulnerability for recurrent depression is presented based on recent developments of resting state neural networks. We propose that alterations in the interplay between task positive (TP) and task negative (TN) elements of the Default Mode Network (DMN) act as a neurobiological risk factor for recurrent depression mediated by cognitive mechanisms. In the framework, depression is characterized by an imbalance between TN-TP components leading to an overpowering of TP by TN activity. The TN-TP imbalance is associated with a dysfunctional internally-focused cognitive style as well as a failure to attenuate TN activity in the transition from rest to task. Thus we propose the TN-TP imbalance as overarching neural mechanism involved in crucial cognitive risk factors for recurrent depression, namely rumination, impaired attentional control, and cognitive reactivity. During remission the TN-TP imbalance persists predisposing to vulnerability of recurrent depression. Empirical data to support this model is reviewed. Finally, we specify how this framework can guide future research efforts.
From Pixels to Population Stress: Global Multispectral Remote Sensing for Vulnerable Communities
NASA Astrophysics Data System (ADS)
Prashad, L.; Kaplan, E.; Letouze, E.; Kirkpatrick, R.; Luengo-Oroz, M.; Christensen, P. R.
2011-12-01
The Arizona State University (ASU) School of Earth and Space Exploration's Mars Space Flight Facility (MSFF) and 100 Cities Project, in collaboration with the United Nations Global Pulse initiative are utilizing NASA multispectral satellite data to visualize and analyze socioeconomic characteristics and human activity in Uganda. The Global Pulse initiative is exploring how new kinds of real-time data and innovative technologies can be leveraged to detect early social impacts of slow-onset crisis and global shocks. Global Pulse is developing a framework for real-time monitoring, assembling an open-source toolkit for analyzing new kinds of data and establishing a global network of country-level "Pulse Labs" where governments, UN agencies, academia and the private sector learn together how to harness the new world of "big data" to protect the vulnerable with targeted and agile policy responses. The ASU MSFF and 100 Cities Project are coordinating with the Global Pulse team to utilize NASA remote sensing data in this effort. Human behavior and socioeconomic parameters have been successfully studied via proxy through remote sensing of the physical environment by measuring the growth of city boundaries and transportation networks, crop health, soil moisture, and slum development from visible and infrared imagery. The NASA/ NOAA image of Earth's "Lights at Night" is routinely used to estimate economic development and population density. There are many examples of the conventional uses of remote sensing in humanitarian-related projects including the Famine Early Warning System Network (FEWS NET) and the UN's operational satellite applications programme (UNOSAT), which provides remote sensing for humanitarian and disaster relief. Since the Global Pulse project is focusing on new, innovative uses of technology for early crisis detection, we are focusing on three non-conventional uses of satellite remote sensing to understand what role NASA multispectral satellites can play in monitoring underlying socioeconomic and human parameters. These are: 1) measuring and visualizing changes in agriculture and fertilizer use in Ugandan villages in order to assist policymakers in designing land use policies and evaluating the impact of fertilizer use on smallholder farmers in developing countries; 2) monitoring the size and composition of large scale rubbish dumps to determine correlation with changes in policy and economic growth; 3) measuring the size and shape of open air markets, or proxies related to the markets, to determine if changes can be detected that correspond to fluctuations in economic activity. The ASU MSFF open source geographical information systems (GIS) platform, J-Earth, will be used to provide easy access to and analytical tools for the data and imagery resulting from this project. J-Earth is a part of the Java Mission-planning and Analysis for Remote Sensing (JMARS) suite of software first developed for targeting NASA instruments on planetary missions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harden, Jennifer W.; Hugelius, Gustaf; Ahlstrom, Anders
Here, soil organic matter supports the Earth’s ability to sustain terrestrial ecosystems, provide food and fiber, and retain the largest pool of actively cycling carbon (C). Over 75% of the soil organic carbon (SOC) in the top meter of soil is directly affected by human land use. Large land areas have lost SOC as a result of land use practices, yet there are compensatory opportunities to enhance land productivity and SOC storage in degraded lands through improved management practices. Large areas with and without intentional management are also being subjected to rapid changes in climate, making many SOC stocks vulnerablemore » to losses by decomposition or disturbance. In order to quantify potential SOC losses or sequestration at field, regional, and global scales, measurements for detecting changes in SOC are needed. Such measurements and soil-management best practices should be based on well-established and emerging scientific understanding of processes of C stabilization and destabilization over various timescales, soil types, and spatial scales. As newly engaged members of the International Soil Carbon Network, we have identified gaps in data, modeling, and communication that underscore the need for an open, shared network to frame and guide the study of soil organic matter and C and their management for sustained production and climate regulation.« less
Truthful Channel Sharing for Self Coexistence of Overlapping Medical Body Area Networks
Dutkiewicz, Eryk; Zheng, Guanglou
2016-01-01
As defined by IEEE 802.15.6 standard, channel sharing is a potential method to coordinate inter-network interference among Medical Body Area Networks (MBANs) that are close to one another. However, channel sharing opens up new vulnerabilities as selfish MBANs may manipulate their online channel requests to gain unfair advantage over others. In this paper, we address this issue by proposing a truthful online channel sharing algorithm and a companion protocol that allocates channel efficiently and truthfully by punishing MBANs for misreporting their channel request parameters such as time, duration and bid for the channel. We first present an online channel sharing scheme for unit-length channel requests and prove that it is truthful. We then generalize our model to settings with variable-length channel requests, where we propose a critical value based channel pricing and preemption scheme. A bid adjustment procedure prevents unbeneficial preemption by artificially raising the ongoing winner’s bid controlled by a penalty factor λ. Our scheme can efficiently detect selfish behaviors by monitoring a trust parameter α of each MBAN and punish MBANs from cheating by suspending their requests. Our extensive simulation results show our scheme can achieve a total profit that is more than 85% of the offline optimum method in the typical MBAN settings. PMID:26844888
Harden, Jennifer W.; Hugelius, Gustaf; Ahlstrom, Anders; ...
2017-10-05
Here, soil organic matter supports the Earth’s ability to sustain terrestrial ecosystems, provide food and fiber, and retain the largest pool of actively cycling carbon (C). Over 75% of the soil organic carbon (SOC) in the top meter of soil is directly affected by human land use. Large land areas have lost SOC as a result of land use practices, yet there are compensatory opportunities to enhance land productivity and SOC storage in degraded lands through improved management practices. Large areas with and without intentional management are also being subjected to rapid changes in climate, making many SOC stocks vulnerablemore » to losses by decomposition or disturbance. In order to quantify potential SOC losses or sequestration at field, regional, and global scales, measurements for detecting changes in SOC are needed. Such measurements and soil-management best practices should be based on well-established and emerging scientific understanding of processes of C stabilization and destabilization over various timescales, soil types, and spatial scales. As newly engaged members of the International Soil Carbon Network, we have identified gaps in data, modeling, and communication that underscore the need for an open, shared network to frame and guide the study of soil organic matter and C and their management for sustained production and climate regulation.« less
NASA Astrophysics Data System (ADS)
Willroth, P.; Massmann, F.; Wehrhahn, R.; Revilla Diez, J.
2012-08-01
The tsunami of December 2004 impacted large areas of Thailand's coastline and caused severe human and economic losses. The recovery period revealed differences in the vulnerabilities of communities affected. An understanding of the causal factors of vulnerability is crucial for minimising the negative effects of future threats and developing adaptive capacities. This paper analyses the vulnerabilities and the development of adaptation strategies in the booming tourist area of Khao Lak and in the predominantly fishing and agricultural area of Ban Nam Khem through a comprehensive vulnerability framework. The results show that social networks played a crucial role in coping with the disaster. Social cohesion is important for strengthening the community and developing successful adaptation strategies. The development of tourism and the turning away from traditional activities have a significant positive influence on the income situation, but create a dependency on a single business sector. It could be shown that households generating their income in the tourism sector were vulnerable unless they had diversified their income previously. Income diversification decreased the vulnerability in the study areas. Adaptation strategies and processes developed in the aftermath clearly address these issues.
Aircraft vulnerability analysis by modeling and simulation
NASA Astrophysics Data System (ADS)
Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta
2014-10-01
Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum guidance acceleration and seeker sensitivity. For the purpose of this investigation the aircraft is equipped with conventional pyrotechnic decoy flares and the missile has no counter-countermeasure means (security restrictions on open publication). This complete simulation is used to calculate the missile miss distance, when the missile is launched from different locations around the aircraft. The miss distance data is then graphically presented showing miss distance (aircraft vulnerability) as a function of launch direction and range. The aircraft vulnerability graph accounts for aircraft and missile characteristics, but does not account for missile deployment doctrine. A Bayesian network is constructed to fuse the doctrinal rules with the aircraft vulnerability data. The Bayesian network now provides the capability to evaluate the combined risk of missile launch and aircraft vulnerability. It is shown in this paper that it is indeed possible to predict the aircraft vulnerability to missile attack in a comprehensive modelling and a holistic process. By using the appropriate real-world models, this approach is used to evaluate the effectiveness of specific countermeasure techniques against specific missile threats. The use of a Bayesian network provides the means to fuse simulated performance data with more abstract doctrinal rules to provide a realistic assessment of the aircraft vulnerability.
Chopra, Shauhrat S; Dillon, Trent; Bilec, Melissa M; Khanna, Vikas
2016-05-01
Modern society is increasingly dependent on the stability of a complex system of interdependent infrastructure sectors. It is imperative to build resilience of large-scale infrastructures like metro systems for addressing the threat of natural disasters and man-made attacks in urban areas. Analysis is needed to ensure that these systems are capable of withstanding and containing unexpected perturbations, and develop heuristic strategies for guiding the design of more resilient networks in the future. We present a comprehensive, multi-pronged framework that analyses information on network topology, spatial organization and passenger flow to understand the resilience of the London metro system. Topology of the London metro system is not fault tolerant in terms of maintaining connectivity at the periphery of the network since it does not exhibit small-world properties. The passenger strength distribution follows a power law, suggesting that while the London metro system is robust to random failures, it is vulnerable to disruptions on a few critical stations. The analysis further identifies particular sources of structural and functional vulnerabilities that need to be mitigated for improving the resilience of the London metro network. The insights from our framework provide useful strategies to build resilience for both existing and upcoming metro systems. © 2016 The Author(s).
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-01-01
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP. PMID:24002231
Responses to a self-presented suicide attempt in social media: a social network analysis.
Fu, King-Wa; Cheng, Qijin; Wong, Paul W C; Yip, Paul S F
2013-01-01
The self-presentation of suicidal acts in social media has become a public health concern. This article centers on a Chinese microblogger who posted a wrist-cutting picture that was widely circulated in Chinese social media in 2011. This exploratory study examines written reactions of a group of Chinese microbloggers exposed to the post containing a self-harming message and photo. In addition, we investigate the pattern of information diffusion via a social network. We systematically collected and analyzed 5,971 generated microblogs and the network of information diffusion. We found that a significant portion of written responses (36.6%) could help vulnerable netizens by providing peer-support and calls for help. These responses were reposted and diffused via an online social network with markedly more clusters of users--and at a faster pace-- than a set of randomly generated networks. We conclude that social media can be a double-edged sword: While it may contagiously affect others by spreading suicidal thoughts and acts, it may also play a positive role by assisting people at risk for suicide, providing rescue or support. More research is needed to learn how suicidally vulnerable people interact with online suicide information, and how we can effectively intervene.
Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo
2013-09-02
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.
Network topology and resilience analysis of South Korean power grid
NASA Astrophysics Data System (ADS)
Kim, Dong Hwan; Eisenberg, Daniel A.; Chun, Yeong Han; Park, Jeryang
2017-01-01
In this work, we present topological and resilience analyses of the South Korean power grid (KPG) with a broad voltage level. While topological analysis of KPG only with high-voltage infrastructure shows an exponential degree distribution, providing another empirical evidence of power grid topology, the inclusion of low voltage components generates a distribution with a larger variance and a smaller average degree. This result suggests that the topology of a power grid may converge to a highly skewed degree distribution if more low-voltage data is considered. Moreover, when compared to ER random and BA scale-free networks, the KPG has a lower efficiency and a higher clustering coefficient, implying that highly clustered structure does not necessarily guarantee a functional efficiency of a network. Error and attack tolerance analysis, evaluated with efficiency, indicate that the KPG is more vulnerable to random or degree-based attacks than betweenness-based intentional attack. Cascading failure analysis with recovery mechanism demonstrates that resilience of the network depends on both tolerance capacity and recovery initiation time. Also, when the two factors are fixed, the KPG is most vulnerable among the three networks. Based on our analysis, we propose that the topology of power grids should be designed so the loads are homogeneously distributed, or functional hubs and their neighbors have high tolerance capacity to enhance resilience.
Grothe, Michel J; Teipel, Stefan J
2016-01-01
Recent neuroimaging studies of Alzheimer's disease (AD) have emphasized topographical similarities between AD-related brain changes and a prominent cortical association network called the default-mode network (DMN). However, the specificity of distinct imaging abnormalities for the DMN compared to other intrinsic connectivity networks (ICNs) of the limbic and heteromodal association cortex has not yet been examined systematically. We assessed regional amyloid load using AV45-PET, neuronal metabolism using FDG-PET, and gray matter volume using structural MRI in 473 participants from the Alzheimer's Disease Neuroimaging Initiative, including preclinical, predementia, and clinically manifest AD stages. Complementary region-of-interest and voxel-based analyses were used to assess disease stage- and modality-specific changes within seven principle ICNs of the human brain as defined by a standardized functional connectivity atlas. Amyloid deposition in AD dementia showed a preference for the DMN, but high effect sizes were also observed for other neocortical ICNs, most notably the frontoparietal-control network. Atrophic changes were most specific for an anterior limbic network, followed by the DMN, whereas other neocortical networks were relatively spared. Hypometabolism appeared to be a mixture of both amyloid- and atrophy-related profiles. Similar patterns of modality-dependent network specificity were also observed in the predementia and, for amyloid deposition, in the preclinical stage. These quantitative data confirm a high vulnerability of the DMN for multimodal imaging abnormalities in AD. However, rather than being selective for the DMN, imaging abnormalities more generally affect higher order cognitive networks and, importantly, the vulnerability profiles of these networks markedly differ for distinct aspects of AD pathology. © 2015 Wiley Periodicals, Inc.
A simple model of global cascades on random networks
NASA Astrophysics Data System (ADS)
Watts, Duncan J.
2002-04-01
The origin of large but rare cascades that are triggered by small initial shocks is a phenomenon that manifests itself as diversely as cultural fads, collective action, the diffusion of norms and innovations, and cascading failures in infrastructure and organizational networks. This paper presents a possible explanation of this phenomenon in terms of a sparse, random network of interacting agents whose decisions are determined by the actions of their neighbors according to a simple threshold rule. Two regimes are identified in which the network is susceptible to very large cascadesherein called global cascadesthat occur very rarely. When cascade propagation is limited by the connectivity of the network, a power law distribution of cascade sizes is observed, analogous to the cluster size distribution in standard percolation theory and avalanches in self-organized criticality. But when the network is highly connected, cascade propagation is limited instead by the local stability of the nodes themselves, and the size distribution of cascades is bimodal, implying a more extreme kind of instability that is correspondingly harder to anticipate. In the first regime, where the distribution of network neighbors is highly skewed, it is found that the most connected nodes are far more likely than average nodes to trigger cascades, but not in the second regime. Finally, it is shown that heterogeneity plays an ambiguous role in determining a system's stability: increasingly heterogeneous thresholds make the system more vulnerable to global cascades; but an increasingly heterogeneous degree distribution makes it less vulnerable.
Network Security Risk Assessment System Based on Attack Graph and Markov Chain
NASA Astrophysics Data System (ADS)
Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian
2017-10-01
Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem
Williams, Patricia AH; Woodward, Andrew J
2015-01-01
The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. PMID:26229513
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.
Williams, Patricia Ah; Woodward, Andrew J
2015-01-01
The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.
On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?
Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn
2015-01-01
Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action. PMID:26512681
NASA Astrophysics Data System (ADS)
Zhang, Mingyuan; Cao, Tianzhuo; Zhao, Xuefeng
2018-03-01
As an effective fall accident preventive method, insight into near-miss falls provides an efficient solution to find out the causes of fall accidents, classify the type of near-miss falls and control the potential hazards. In this context, the paper proposes a method to detect and identify near-miss falls that occur when a worker walks in a workplace based on artificial neural network (ANN). The energy variation generated by workers who meet with near-miss falls is measured by sensors embedded in smart phone. Two experiments were designed to train the algorithm to identify various types of near-miss falls and test the recognition accuracy, respectively. At last, a test was conducted by workers wearing smart phones as they walked around a simulated construction workplace. The motion data was collected, processed and inputted to the trained ANN to detect and identify near-miss falls. Thresholds were obtained to measure the relationship between near-miss falls and fall accidents in a quantitate way. This approach, which integrates smart phone and ANN, will help detect near-miss fall events, identify hazardous elements and vulnerable workers, providing opportunities to eliminate dangerous conditions in a construction site or to alert possible victims that need to change their behavior before the occurrence of a fall accident.
Tactile functions after cerebral hemispherectomy.
Backlund, H; Morin, C; Ptito, A; Bushnell, M C; Olausson, H
2005-01-01
Patients that were hemispherectomized due to brain lesions early in life sometimes have remarkably well-preserved tactile functions on their paretic body half. This has been attributed to developmental neuroplasticity. However, the tactile examinations generally have been fairly crude, and subtle deficits may not have been revealed. We investigated monofilament detection and three types of tactile directional sensibility in four hemispherectomized patients and six healthy controls. Patients were examined bilaterally on the face, forearm and lower leg. Normal subjects were examined unilaterally. Following each test of directional sensibility, subjects were asked to rate the intensity of the stimulation. On the nonparetic side, results were almost always in the normal range. On the paretic side, the patients' capacity for monofilament detection was less impaired than their directional sensibility. Despite the disturbed directional sensibility on their paretic side the patients rated tactile sensations evoked by the stimuli, on both their paretic and nonparetic body halves, as more intense than normals. Thus, mechanisms of plasticity seem adequate for tactile detection and intensity coding but not for more complex tactile functions such as directional sensibility. The reason for the high vulnerability of tactile directional sensibility may be that it depends on spatially and temporally precise afferent information processed in a distributed cortical network.
Research on the information security system in electrical gis system in mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Jiang, Haitao; Huang, Wei; Zhu, Daohua
2017-05-01
With the rapid development of social informatization process, the demands of government, enterprise, and individuals for spatial information becomes larger. In addition, the combination of wireless network technology and spatial information technology promotes the generation and development of mobile technologies. In today’s rapidly developed information technology field, network technology and mobile communication have become the two pillar industries by leaps and bounds. They almost absorbed and adopted all the latest information, communication, computer, electronics and so on new technologies. Concomitantly, the network coverage is more and more big, the transmission rate is faster and faster, the volume of user’s terminal is smaller and smaller. What’s more, from LAN to WAN, from wired network to wireless network, from wired access to mobile wireless access, people’s demand for communication technology is increasingly higher. As a result, mobile communication technology is facing unprecedented challenges as well as unprecedented opportunities. When combined with the existing mobile communication network, it led to the development of leaps and bounds. However, due to the inherent dependence of the system on the existing computer communication network, information security problems cannot be ignored. Today’s information security has penetrated into all aspects of life. Information system is a complex computer system, and it’s physical, operational and management vulnerabilities constitute the security vulnerability of the system. Firstly, this paper analyzes the composition of mobile enterprise network and information security threat. Secondly, this paper puts forward the security planning and measures, and constructs the information security structure.
Ceschin, Rafael; Zahner, Alexandria; Reynolds, William; Gaesser, Jenna; Zuccoli, Giulio; Lo, Cecilia W; Gopalakrishnan, Vanathi; Panigrahy, Ashok
2018-05-21
Deep neural networks are increasingly being used in both supervised learning for classification tasks and unsupervised learning to derive complex patterns from the input data. However, the successful implementation of deep neural networks using neuroimaging datasets requires adequate sample size for training and well-defined signal intensity based structural differentiation. There is a lack of effective automated diagnostic tools for the reliable detection of brain dysmaturation in the neonatal period, related to small sample size and complex undifferentiated brain structures, despite both translational research and clinical importance. Volumetric information alone is insufficient for diagnosis. In this study, we developed a computational framework for the automated classification of brain dysmaturation from neonatal MRI, by combining a specific deep neural network implementation with neonatal structural brain segmentation as a method for both clinical pattern recognition and data-driven inference into the underlying structural morphology. We implemented three-dimensional convolution neural networks (3D-CNNs) to specifically classify dysplastic cerebelli, a subset of surface-based subcortical brain dysmaturation, in term infants born with congenital heart disease. We obtained a 0.985 ± 0. 0241-classification accuracy of subtle cerebellar dysplasia in CHD using 10-fold cross-validation. Furthermore, the hidden layer activations and class activation maps depicted regional vulnerability of the superior surface of the cerebellum, (composed of mostly the posterior lobe and the midline vermis), in regards to differentiating the dysplastic process from normal tissue. The posterior lobe and the midline vermis provide regional differentiation that is relevant to not only to the clinical diagnosis of cerebellar dysplasia, but also genetic mechanisms and neurodevelopmental outcome correlates. These findings not only contribute to the detection and classification of a subset of neonatal brain dysmaturation, but also provide insight to the pathogenesis of cerebellar dysplasia in CHD. In addition, this is one of the first examples of the application of deep learning to a neuroimaging dataset, in which the hidden layer activation revealed diagnostically and biologically relevant features about the clinical pathogenesis. The code developed for this project is open source, published under the BSD License, and designed to be generalizable to applications both within and beyond neonatal brain imaging. Copyright © 2018 Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Gu, Xiaoqing; Ding, Rui; Fu, Shirong
2011-01-01
Senior citizens are comparatively vulnerable in accessing learning opportunities offered on the Internet due to usability problems in current web design. In an effort to build a senior-friendly learning web as a part of the Life-long Learning Network in Shanghai, usability studies of two websites currently available to Shanghai senior citizens…
Moving Target Techniques: Leveraging Uncertainty for Cyber Defense
2015-08-24
vulnerability (a flaw or bug that an attacker can exploit to penetrate or disrupt a system) to successfully compromise systems. Defenders, however...device drivers, numerous software applications, and hardware components. Within the cyberspace, this imbalance between a simple, one- bug attack...parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the properties
ERIC Educational Resources Information Center
McCune, T. John
2017-01-01
With privacy settings on social networking sites (SNS) perceived as complex and difficult to use and maintain, young adults can be left vulnerable to others accessing and using their personal information. Consequences of not regulating the boundaries their information on SNS include the ability for current and future employers to make…
Robustness of the p53 network and biological hackers.
Dartnell, Lewis; Simeonidis, Evangelos; Hubank, Michael; Tsoka, Sophia; Bogle, I David L; Papageorgiou, Lazaros G
2005-06-06
The p53 protein interaction network is crucial in regulating the metazoan cell cycle and apoptosis. Here, the robustness of the p53 network is studied by analyzing its degeneration under two modes of attack. Linear Programming is used to calculate average path lengths among proteins and the network diameter as measures of functionality. The p53 network is found to be robust to random loss of nodes, but vulnerable to a targeted attack against its hubs, as a result of its architecture. The significance of the results is considered with respect to mutational knockouts of proteins and the directed attacks mounted by tumour inducing viruses.
NASA Astrophysics Data System (ADS)
Poulter, Benjamin; Goodall, Jonathan L.; Halpin, Patrick N.
2008-08-01
SummaryThe vulnerability of coastal landscapes to sea level rise is compounded by the existence of extensive artificial drainage networks initially built to lower water tables for agriculture, forestry, and human settlements. These drainage networks are found in landscapes with little topographic relief where channel flow is characterized by bi-directional movement across multiple time-scales and related to precipitation, wind, and tidal patterns. The current configuration of many artificial drainage networks exacerbates impacts associated with sea level rise such as salt-intrusion and increased flooding. This suggests that in the short-term, drainage networks might be managed to mitigate sea level rise related impacts. The challenge, however, is that hydrologic processes in regions where channel flow direction is weakly related to slope and topography require extensive parameterization for numerical models which is limited where network size is on the order of a hundred or more kilometers in total length. Here we present an application of graph theoretic algorithms to efficiently investigate network properties relevant to the management of a large artificial drainage system in coastal North Carolina, USA. We created a digital network model representing the observation network topology and four types of drainage features (canal, collector and field ditches, and streams). We applied betweenness-centrality concepts (using Dijkstra's shortest path algorithm) to determine major hydrologic flowpaths based off of hydraulic resistance. Following this, we identified sub-networks that could be managed independently using a community structure and modularity approach. Lastly, a betweenness-centrality algorithm was applied to identify major shoreline entry points to the network that disproportionately control water movement in and out of the network. We demonstrate that graph theory can be applied to solving management and monitoring problems associated with sea level rise for poorly understood drainage networks in advance of numerical methods.
Network theory and its applications in economic systems
NASA Astrophysics Data System (ADS)
Huang, Xuqing
This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the failure of over 350 US commercial banks during 2008 - 2011.
Analysis of a SCADA System Anomaly Detection Model Based on Information Entropy
2014-03-27
20 Intrusion Detection...alarms ( Rem ). ............................................................................................................. 86 Figure 25. TP% for...literature concerning the focus areas of this research. The focus areas include SCADA vulnerabilities, information theory, and intrusion detection
Percolation of a general network of networks.
Gao, Jianxi; Buldyrev, Sergey V; Stanley, H Eugene; Xu, Xiaoming; Havlin, Shlomo
2013-12-01
Percolation theory is an approach to study the vulnerability of a system. We develop an analytical framework and analyze the percolation properties of a network composed of interdependent networks (NetONet). Typically, percolation of a single network shows that the damage in the network due to a failure is a continuous function of the size of the failure, i.e., the fraction of failed nodes. In sharp contrast, in NetONet, due to the cascading failures, the percolation transition may be discontinuous and even a single node failure may lead to an abrupt collapse of the system. We demonstrate our general framework for a NetONet composed of n classic Erdős-Rényi (ER) networks, where each network depends on the same number m of other networks, i.e., for a random regular network (RR) formed of interdependent ER networks. The dependency between nodes of different networks is taken as one-to-one correspondence, i.e., a node in one network can depend only on one node in the other network (no-feedback condition). In contrast to a treelike NetONet in which the size of the largest connected cluster (mutual component) depends on n, the loops in the RR NetONet cause the largest connected cluster to depend only on m and the topology of each network but not on n. We also analyzed the extremely vulnerable feedback condition of coupling, where the coupling between nodes of different networks is not one-to-one correspondence. In the case of NetONet formed of ER networks, percolation only exhibits two phases, a second order phase transition and collapse, and no first order percolation transition regime is found in the case of the no-feedback condition. In the case of NetONet composed of RR networks, there exists a first order phase transition when the coupling strength q (fraction of interdependency links) is large and a second order phase transition when q is small. Our insight on the resilience of coupled networks might help in designing robust interdependent systems.
Ramanadhan, Shoba; Nagler, Rebekah H; McCloud, Rachel; Kohler, Racquel; Viswanath, Kasisomayajula
2017-02-01
Graphic health warnings (GHWs) on cigarette packages present an important tobacco control opportunity, particularly for vulnerable populations suffering a disproportionate tobacco burden. One mechanism by which GHWs may influence smoking outcomes is by prompting interpersonal discussions within health discussion networks (the set of personal contacts with whom an individual discusses health issues). The study examined the association between GHW-prompted conversations within health discussion networks and key tobacco-related outcomes, with attention to valence and content of the discussions. Between August 2013 and April 2014, we recruited 1200 individuals from three communities in Massachusetts, emphasizing recruitment of individuals of low socioeconomic position (SEP) and members of other selected vulnerable groups. Respondents were exposed to the nine GHWs proposed by the FDA in 2011, asked a series of questions, and assessed at follow-up a few weeks later. A total of 806 individuals were included in this analysis. About 51% of respondents reported having a health discussion network, with significantly lower reports among African-Americans and Hispanics compared to Whites. Around 70% of respondents (smokers and nonsmokers) with health discussion networks reported having one or more conversations about the GHWs with network members, the bulk of which were negative and focused on warning others about smoking. For smokers, we found a small but positive association between the percentage of network conversations that were negative and reports of quit attempts. The results point to a potential mechanism by which GHWs may impact tobacco-related outcomes, prompting further inquiry into the role of health discussion networks (and discussion networks, more broadly) in tobacco control among low SEP individuals. Copyright © 2017 Elsevier Ltd. All rights reserved.
Ramanadhan, Shoba; Nagler, Rebekah H.; McCloud, Rachel; Kohler, Racquel; Viswanath, Kasisomayajula
2017-01-01
Rationale Graphic health warnings (GHWs) on cigarette packages present an important tobacco control opportunity, particularly for vulnerable populations suffering a disproportionate tobacco burden. One mechanism by which GHWs may influence smoking outcomes is by prompting interpersonal discussions within health discussion networks (the set of personal contacts with whom an individual discusses health issues). Objective The study examined the association between GHW-prompted conversations within health discussion networks and key tobacco-related outcomes, with attention to valence and content of the discussions. Method Between August 2013 and April 2014, we recruited 1200 individuals from three communities in Massachusetts, emphasizing recruitment of individuals of low socioeconomic position (SEP) and members of other selected vulnerable groups. Respondents were exposed to the nine GHWs proposed by the FDA in 2011, asked a series of questions, and assessed at follow-up a few weeks later. Results A total of 806 individuals were included in this analysis. About 51% of respondents reported having a health discussion network, with significantly lower reports among African-Americans and Hispanics compared to Whites. Around 70% of respondents (smokers and nonsmokers) with health discussion networks reported having one or more conversations about the GHWs with network members, the bulk of which were negative and focused on warning others about smoking. For smokers, we found a small but positive association between the percentage of network conversations that were negative and reports of quit attempts. Conclusion The results point to a potential mechanism by which GHWs may impact tobacco-related outcomes, prompting further inquiry into the role of health discussion networks (and discussion networks, more broadly) in tobacco control among low SEP individuals. PMID:28108053
Enserink, Remko; Meijer, Adam; Dijkstra, Frederika; van Benthem, Birgit; van der Steen, Jenny T; Haenen, Anja; van Delden, Hans; Cools, Herman; van der Sande, Marianne; Veldman-Ariesen, Marie-Jose
2011-12-01
To describe the epidemiological, virological, and institutional characteristics of influenza-like illness (ILI) in nursing homes (NHs). Continuous clinical surveillance of ILI and virological surveillance of ILI and other acute respiratory infections (ARIs) during four influenza seasons. National sentinel NH surveillance network. National sentinel residents. Weekly registration of ILI cases (influenza seasons 2008/09-2009/10), influenza virus detection (influenza seasons 2006/07-2009/10), and collection of institutional characteristics of NHs at start of participation. During the 2008/09 influenza season, ILI incidence started to rise in Week 49 of 2008, peaked in Week 3 of 2009 (158 cases per 10,000 resident weeks), and flattened out by Week 16 of 2009 (mean ILI incidence during epidemic: 73 cases per 10,000 resident weeks). During the 2009/10 influenza pandemic, there was no epidemic peak. Influenza virus type and subtype varied throughout virological surveillance but was limited to influenza A(H3N2) and B viruses. Higher staff vaccination coverage (>15%) was associated with lower ILI-incidence in the 2008/09 influenza season in a univariate negative binomial regression analysis (incidence rate ratio = 0.3, 95% confidence interval = 0.1-0.8)). Neither seasonal nor pandemic influenza A(H1N1) viruses were detected in the network, despite widespread community transmission of seasonal and influenza A(H1N1) virus. ILI incidence trends corresponded to virological trends. Sentinel surveillance of ILI combining clinical and virological data in NHs increases understanding of transmission risks in this specific vulnerable population. © 2011, Copyright the Authors Journal compilation © 2011, The American Geriatrics Society.
Gurdak, Jason J.; Qi, Sharon L.
2012-01-01
Recently recharged water (defined here as <60 years old) is generally the most vulnerable part of a groundwater resource to nonpoint-source nitrate contamination. Understanding at the appropriate scale the interactions of natural and anthropogenic controlling factors that influence nitrate occurrence in recently recharged groundwater is critical to support best management and policy decisions that are often made at the aquifer to subaquifer scale. New logistic regression models were developed using data from the U.S. Geological Survey's National Water-Quality Assessment (NAWQA) program and National Water Information System for 17 principal aquifers of the U.S. to identify important source, transport, and attenuation factors that control nonpoint source nitrate concentrations greater than relative background levels in recently recharged groundwater and were used to predict the probability of detecting elevated nitrate in areas beyond the sampling network. Results indicate that dissolved oxygen, crops and irrigated cropland, fertilizer application, seasonally high water table, and soil properties that affect infiltration and denitrification are among the most important factors in predicting elevated nitrate concentrations. Important differences in controlling factors and spatial predictions were identified in the principal aquifer and national-scale models and support the conclusion that similar spatial scales are needed between informed groundwater management and model development.
NASA Astrophysics Data System (ADS)
Gendreau, Audrey
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research, a model used to deploy intrusion detection capability on a Local Area Network (LAN), in the literature, was extended to develop a role-based hierarchical agent deployment algorithm for a WSN. The resulting model took into consideration the monitoring capability, risk, deployment distribution cost, and monitoring cost associated with each node. Changing the original LAN methodology approach to model a cluster-based sensor network depended on the ability to duplicate a specific parameter that represented the monitoring capability. Furthermore, other parameters derived from a LAN can elevate costs and risk of deployment, as well as jeopardize the success of an application on a WSN. A key component of the approach presented in this research was to reduce the costs when established clusterheads in the network were found to be capable of hosting additional detection agents. In addition, another cost savings component of the study addressed the reduction of vulnerabilities associated with deployment of agents to high volume nodes. The effectiveness of the presented method was validated by comparing it against a type of a power-based scheme that used each node's remaining energy as the deployment value. While available energy is directly related to the model used in the presented method, the study deliberately sought out nodes that were identified with having superior monitoring capability, cost less to create and sustain, and are at low-risk of an attack. This work investigated improving the efficiency of an intrusion detection system (IDS) by using the proposed model to deploy monitoring agents after a temperature sensing application had established the network traffic flow to the sink. The same scenario was repeated using a power-based IDS to compare it against the proposed model. To identify a clusterhead's ability to host monitoring agents after the temperature sensing application terminated, the deployed IDS utilized the communication history and other network factors in order to rank the nodes. Similarly, using the node's communication history, the deployed power-based IDS ranked nodes based on their remaining power. For each individual scenario, and after the IDS application was deployed, the temperature sensing application was run for a second time. This time, to monitor the temperature sensing agents as the data flowed towards the sink, the network traffic was rerouted through the new intrusion detection clusterheads. Consequently, if the clusterheads were shared, the re-routing step was not preformed. Experimental results in this research demonstrated the effectiveness of applying a robust deployment metric to improve upon the energy efficiency of a deployed application in a multi-application WSN. It was found that in the scenarios with the intrusion detection application that utilized the proposed model resulted in more remaining energy than in the scenarios that implemented the power-based IDS. The algorithm especially had a positive impact on the small, dense, and more homogeneous networks. This finding was reinforced by the smaller percentage of new clusterheads that was selected. Essentially, the energy cost of the route to the sink was reduced because the network traffic was rerouted through fewer new clusterheads. Additionally, it was found that the intrusion detection topology that used the proposed approach formed smaller and more connected sets of clusterheads than the power-based IDS. As a consequence, this proposed approach essentially achieved the research objective for enhancing energy use in a multi-application WSN.
Practical Computer Security through Cryptography
NASA Technical Reports Server (NTRS)
McNab, David; Twetev, David (Technical Monitor)
1998-01-01
The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.
NASA Astrophysics Data System (ADS)
Wang, Kai; Zhang, Bu-han; Zhang, Zhe; Yin, Xiang-gen; Wang, Bo
2011-11-01
Most existing research on the vulnerability of power grids based on complex networks ignores the electrical characteristics and the capacity of generators and load. In this paper, the electrical betweenness is defined by considering the maximal demand of load and the capacity of generators in power grids. The loss of load, which reflects the ability of power grids to provide sufficient power to customers, is introduced to measure the vulnerability together with the size of the largest cluster. The simulation results of the IEEE-118 bus system and the Central China Power Grid show that the cumulative distributions of node electrical betweenness follow a power-law and that the nodes with high electrical betweenness play critical roles in both topological structure and power transmission of power grids. The results prove that the model proposed in this paper is effective for analyzing the vulnerability of power grids.
Early Detection Monitoring for Vulnerable Great Lakes Coastal Ecosystems
Great Lakes harbors/embayments are vulnerable to introduction of aquatic invasive species. Monitoring is needed to inform on new introductions, as well as to track success of prevention programs intended to limit spread. We have completed a pilot field case study in the Duluth-...
Auditing Albaha University Network Security using in-house Developed Penetration Tool
NASA Astrophysics Data System (ADS)
Alzahrani, M. E.
2018-03-01
Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.
Optimizing topological cascade resilience based on the structure of terrorist networks.
Gutfraind, Alexander
2010-11-10
Complex socioeconomic networks such as information, finance and even terrorist networks need resilience to cascades--to prevent the failure of a single node from causing a far-reaching domino effect. We show that terrorist and guerrilla networks are uniquely cascade-resilient while maintaining high efficiency, but they become more vulnerable beyond a certain threshold. We also introduce an optimization method for constructing networks with high passive cascade resilience. The optimal networks are found to be based on cells, where each cell has a star topology. Counterintuitively, we find that there are conditions where networks should not be modified to stop cascades because doing so would come at a disproportionate loss of efficiency. Implementation of these findings can lead to more cascade-resilient networks in many diverse areas.
Supporting secure programming in web applications through interactive static analysis.
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2014-07-01
Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.
Supporting secure programming in web applications through interactive static analysis
Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill
2013-01-01
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513
Using Bayesian networks to assess the vulnerability of Hawaiian terrestrial biota to climate change
NASA Astrophysics Data System (ADS)
Fortini, L.; Jacobi, J.; Price, J.; Vorsino, A.; Paxton, E.; Amidon, F.; 'Ohukani'ohi'a Gon, S., III; Koob, G.; Brink, K.; Burgett, J.; Miller, S.
2012-12-01
As the effects of climate change on individual species become increasingly apparent, there is a clear need for effective adaptation planning to prevent an increase in species extinctions worldwide. Given the limited understanding of species responses to climate change, vulnerability assessments and species distribution models (SDMs) have been two common tools used to jump-start climate change adaptation efforts. However, although these two approaches generally serve the same purpose of understanding species future responses to climate change, they have rarely mixed. In collaboration with research and management partners from federal, state and non-profit organizations, we are conducting a climate change vulnerability assessment for hundreds of plant and forest bird species of the Main Hawaiian Islands. This assessment is the first to comprehensively consider the potential threats of climate change to a significant portion of Hawaii's fauna and flora (over one thousand species considered) and thus fills a critical gap defined by natural resource scientists and managers in the region. We have devised a flexible approach that effectively integrates species distribution models into a vulnerability assessment framework that can be easily updated with improved models and data. This tailors our assessment approach to the Pacific Island reality of often limited and fragmented information on species and large future climate uncertainties, This vulnerability assessment is based on a Bayesian network-based approach that integrates multiple landscape (e.g., topographic diversity, dispersal barriers), species trait (e.g., generation length, fecundity) and expert-knowledge based information (e.g., capacity to colonize restored habitat) relevant to long-term persistence of species under climate change. Our presentation will highlight some of the results from our assessment but will mainly focus on the utility of the flexible approach we have developed and its potential application in other settings.
Interfacing with in-Situ Data Networks during the Arctic Boreal Vulnerability Experiment (ABoVE)
NASA Astrophysics Data System (ADS)
McInerney, M.; Griffith, P. C.; Duffy, D.; Hoy, E.; Schnase, J. L.; Sinno, S.; Thompson, J. H.
2014-12-01
The Arctic Boreal Vulnerability Experiment (ABoVE) is designed to improve understanding of the causes and impacts of ecological changes in Arctic/boreal regions, and will integrate field-based studies, modeling, and data from airborne and satellite remote sensing. ABoVE will result in a fuller understanding of ecosystem vulnerability and resilience to environmental change in the Arctic and boreal regions of western North America, and provide scientific information required to develop options for societal responses to the impacts of these changes. The studies sponsored by NASA during ABoVE will be coordinated with research and in-situ monitoring activities being sponsored by a number of national and international partners. The NASA Center for Climate Simulation at the Goddard Space Flight Center has partnered with the NASA Carbon Cycle & Ecosystems Office to create a science cloud designed for this field campaign - the ABoVE Science Cloud (ASC). The ASC combines high performance computing with emerging technologies to create an environment specifically designed for large-scale modeling, analysis of remote sensing data, copious disk storage with integrated data management, and integration of core variables from in-situ networks identified by the ABoVE Science Definition Team. In this talk, we will present the scientific requirements driving the development of the ABoVE Science Cloud, discuss the necessary interfaces, both computational and human, with in-situ monitoring networks, and show examples of how the ASC is being used to meet the needs of the ABoVE campaign.
NASA Astrophysics Data System (ADS)
Ceola, S.; Laio, F.; Montanari, A.
2013-12-01
The study and the analysis of the interactions and feedbacks between hydrology and society constitute the main issue of socio-hydrology. Recent flood events, which occurred across the globe, highlighted once again that mitigation strategies are needed to reduce flood risk. In particular, quick procedures for the identification of vulnerable human settlements and flood prone areas are a necessary tool to identify priorities for flood risk management. To this aim, a 19-year long period of world-wide night light data, as a proxy of human population, and the global river network have been examined. The spatio-temporal evolution of artificial luminosity depending on the distance from the river network has been assessed in order to quantitatively identify the likelihood for a populated pixel to be reached by water. The analysis focuses both on a global and on a local scale. Hotspots, such as highly illuminated areas and developing regions, have been also examined. The analysis shows an increment of yearly-averaged artificial luminosity from 1992 to 2010 (i.e. the time period of satellite data availability), whereas light intensity tends to decrease with increasing distance from the river network. The results thus reveal an increased vulnerability of human settlements to flooding events. A nearly 70-year long period of peace and the economic development after the Second World War could reasonably explain the observed enhancement of human population proximity to water bodies.
NASA Astrophysics Data System (ADS)
Lee, Sang-Hyun; Mohtar, Rabi H.; Choi, Jin-Yong; Yoo, Seung-Hwan
2016-10-01
This study aims to analyze the characteristics of global virtual water trade (GVWT), such as the connectivity of each trader, vulnerable importers, and influential countries, using degree and eigenvector centrality during the period 2006-2010. The degree centrality was used to measure the connectivity, and eigenvector centrality was used to measure the influence on the entire GVWT network. Mexico, Egypt, China, the Republic of Korea, and Japan were classified as vulnerable importers, because they imported large quantities of virtual water with low connectivity. In particular, Egypt had a 15.3 Gm3 year-1 blue water saving effect through GVWT: the vulnerable structure could cause a water shortage problem for the importer. The entire GVWT network could be changed by a few countries, termed "influential traders". We used eigenvector centrality to identify those influential traders. In GVWT for food crops, the USA, Russian Federation, Thailand, and Canada had high eigenvector centrality with large volumes of green water trade. In the case of blue water trade, western Asia, Pakistan, and India had high eigenvector centrality. For feed crops, the green water trade in the USA, Brazil, and Argentina was the most influential. However, Argentina and Pakistan used high proportions of internal water resources for virtual water export (32.9 and 25.1 %); thus other traders should carefully consider water resource management in these exporters.
Roncarolo, Federico; Adam, Caroline; Bisset, Sherri; Potvin, Louise
2015-04-01
Food insecurity is steadily increasing in developed countries. Traditional interventions adopted to tackle food insecurity, like food banks, address the urgent need for food. By contrast, alternative interventions, such as community gardens and kitchens, are oriented towards social integration and the development of mutual aid networks. The objective of this paper is to examine whether the populations served by traditional and alternative interventions in food security differ according to measures of vulnerability. We studied newly registered participants to food security interventions. Participants were selected from a random sample of food security community organizations in a two-stage cluster sampling frame. The categorizing variable was participation in a community organization providing either traditional interventions or alternative interventions. Seven measures of vulnerability were used: food security; perceived health; civic participation; perceived social support of the primary network, social isolation, income and education. Regression multilevel models were used to assess associations. 711 participants in traditional interventions and 113 in alternative interventions were enrolled in the study. Between group differences were found with respect to food insecurity, health status perception, civic participation, education and income, but not with respect to social isolation or perceived social support from primary social network. Traditional and alternative food security interventions seem to reach different populations. Participants in traditional interventions were found to have less access to resources, compared to those in alternative interventions. Thus, new participants in traditional interventions may have higher levers of vulnerability than those in alternative interventions.
NASA Astrophysics Data System (ADS)
Ankri, Rinat; Leshem-Lev, Dorit; Lev, Eli I.; Motiei, Menachem; Hochhauser, Edith; Fixler, Dror
2016-03-01
In our study we aim to develop a new, simple and non-invasive method to detect and to treat atherosclerosis. We use gold nanoparticles (GNPs) combined with the diffusion reflection (DR) method to demonstrate the detection of vulnerable atherosclerotic plaques. Our method is based on the fact that macrophages are a major component in the vulnerable plaque and are able to uptake metal nanoparticles that can be discovered by the DR system. Moreover, it is well known that high density lipoprotein (HDL) reduces ASVD by inhibiting pro-inflammatory factors, enabling the specific treatment of atherosclerosis.
Moving Target Techniques: Leveraging Uncertainty for CyberDefense
2015-12-15
cyberattacks is a continual struggle for system managers. Attackers often need only find one vulnerability (a flaw or bug that an attacker can exploit...additional parsing code itself could have security-relevant software bugs . Dynamic Network Techniques in the dynamic network domain change the...evaluation of MT techniques can benefit from a variety of evaluation approaches, including abstract analysis, modeling and simulation, test bed
Cyber Hygiene for Control System Security
Oliver, David
2015-10-08
There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.
Griffith, Kereen T.; Larriviere, Jack C.; Feher, Laura C.; Cahoon, Donald R.; Enwright, Nicholas M.; Oster, David A.; Tirpak, John M.; Woodrey, Mark S.; Collini, Renee C.; Baustian, Joseph J.; Breithaupt, Joshua L.; Cherry, Julia A.; Conrad, Jeremy R.; Cormier, Nicole; Coronado-Molina, Carlos A.; Donoghue, Joseph F.; Graham, Sean A.; Harper, Jennifer W.; Hester, Mark W.; Howard, Rebecca J.; Krauss, Ken W.; Kroes, Daniel E.; Lane, Robert R.; McKee, Karen L.; Mendelssohn, Irving A.; Middleton, Beth A.; Moon, Jena A.; Piazza, Sarai C.; Rankin, Nicole M.; Sklar, Fred H.; Steyer, Greg D.; Swanson, Kathleen M.; Swarzenski, Christopher M.; Vervaeke, William C.; Willis, Jonathan M.; Wilson, K. Van
2017-01-01
Coastal wetland responses to sea-level rise are greatly influenced by biogeomorphic processes that affect wetland surface elevation. Small changes in elevation relative to sea level can lead to comparatively large changes in ecosystem structure, function, and stability. The surface elevation table-marker horizon (SET-MH) approach is being used globally to quantify the relative contributions of processes affecting wetland elevation change. Historically, SET-MH measurements have been obtained at local scales to address site-specific research questions. However, in the face of accelerated sea-level rise, there is an increasing need for elevation change network data that can be incorporated into regional ecological models and vulnerability assessments. In particular, there is a need for long-term, high-temporal resolution data that are strategically distributed across ecologically-relevant abiotic gradients. Here, we quantify the distribution of SET-MH stations along the northern Gulf of Mexico coast (USA) across political boundaries (states), wetland habitats, and ecologically-relevant abiotic gradients (i.e., gradients in temperature, precipitation, elevation, and relative sea-level rise). Our analyses identify areas with high SET-MH station densities as well as areas with notable gaps. Salt marshes, intermediate elevations, and colder areas with high rainfall have a high number of stations, while salt flat ecosystems, certain elevation zones, the mangrove-marsh ecotone, and hypersaline coastal areas with low rainfall have fewer stations. Due to rapid rates of wetland loss and relative sea-level rise, the state of Louisiana has the most extensive SET-MH station network in the region, and we provide several recent examples where data from Louisiana’s network have been used to assess and compare wetland vulnerability to sea-level rise. Our findings represent the first attempt to examine spatial gaps in SET-MH coverage across abiotic gradients. Our analyses can be used to transform a broadly disseminated and unplanned collection of SET-MH stations into a coordinated and strategic regional network. This regional network would provide data for predicting and preparing for the responses of coastal wetlands to accelerated sea-level rise and other aspects of global change. PMID:28902904
Osland, Michael J.; Griffith, Kereen T.; Larriviere, Jack C.; Feher, Laura C.; Cahoon, Donald R.; Enwright, Nicholas M.; Oster, David A.; Tirpak, John M.; Woodrey, Mark S.; Collini, Renee C.; Baustian, Joseph J.; Breithaupt, Joshua L.; Cherry, Julia A; Conrad, Jeremy R.; Cormier, Nicole; Coronado-Molina, Carlos A.; Donoghue, Joseph F.; Graham, Sean A.; Harper, Jennifer W.; Hester, Mark W.; Howard, Rebecca J.; Krauss, Ken W.; Kroes, Daniel; Lane, Robert R.; Mckee, Karen L.; Mendelssohn, Irving A.; Middleton, Beth A.; Moon, Jena A.; Piazza, Sarai; Rankin, Nicole M.; Sklar, Fred H.; Steyer, Gregory D.; Swanson, Kathleen M.; Swarzenski, Christopher M.; Vervaeke, William; Willis, Jonathan M; Van Wilson, K.
2017-01-01
Coastal wetland responses to sea-level rise are greatly influenced by biogeomorphic processes that affect wetland surface elevation. Small changes in elevation relative to sea level can lead to comparatively large changes in ecosystem structure, function, and stability. The surface elevation table-marker horizon (SET-MH) approach is being used globally to quantify the relative contributions of processes affecting wetland elevation change. Historically, SET-MH measurements have been obtained at local scales to address site-specific research questions. However, in the face of accelerated sea-level rise, there is an increasing need for elevation change network data that can be incorporated into regional ecological models and vulnerability assessments. In particular, there is a need for long-term, high-temporal resolution data that are strategically distributed across ecologically-relevant abiotic gradients. Here, we quantify the distribution of SET-MH stations along the northern Gulf of Mexico coast (USA) across political boundaries (states), wetland habitats, and ecologically-relevant abiotic gradients (i.e., gradients in temperature, precipitation, elevation, and relative sea-level rise). Our analyses identify areas with high SET-MH station densities as well as areas with notable gaps. Salt marshes, intermediate elevations, and colder areas with high rainfall have a high number of stations, while salt flat ecosystems, certain elevation zones, the mangrove-marsh ecotone, and hypersaline coastal areas with low rainfall have fewer stations. Due to rapid rates of wetland loss and relative sea-level rise, the state of Louisiana has the most extensive SET-MH station network in the region, and we provide several recent examples where data from Louisiana’s network have been used to assess and compare wetland vulnerability to sea-level rise. Our findings represent the first attempt to examine spatial gaps in SET-MH coverage across abiotic gradients. Our analyses can be used to transform a broadly disseminated and unplanned collection of SET-MH stations into a coordinated and strategic regional network. This regional network would provide data for predicting and preparing for the responses of coastal wetlands to accelerated sea-level rise and other aspects of global change.
Osland, Michael J; Griffith, Kereen T; Larriviere, Jack C; Feher, Laura C; Cahoon, Donald R; Enwright, Nicholas M; Oster, David A; Tirpak, John M; Woodrey, Mark S; Collini, Renee C; Baustian, Joseph J; Breithaupt, Joshua L; Cherry, Julia A; Conrad, Jeremy R; Cormier, Nicole; Coronado-Molina, Carlos A; Donoghue, Joseph F; Graham, Sean A; Harper, Jennifer W; Hester, Mark W; Howard, Rebecca J; Krauss, Ken W; Kroes, Daniel E; Lane, Robert R; McKee, Karen L; Mendelssohn, Irving A; Middleton, Beth A; Moon, Jena A; Piazza, Sarai C; Rankin, Nicole M; Sklar, Fred H; Steyer, Greg D; Swanson, Kathleen M; Swarzenski, Christopher M; Vervaeke, William C; Willis, Jonathan M; Wilson, K Van
2017-01-01
Coastal wetland responses to sea-level rise are greatly influenced by biogeomorphic processes that affect wetland surface elevation. Small changes in elevation relative to sea level can lead to comparatively large changes in ecosystem structure, function, and stability. The surface elevation table-marker horizon (SET-MH) approach is being used globally to quantify the relative contributions of processes affecting wetland elevation change. Historically, SET-MH measurements have been obtained at local scales to address site-specific research questions. However, in the face of accelerated sea-level rise, there is an increasing need for elevation change network data that can be incorporated into regional ecological models and vulnerability assessments. In particular, there is a need for long-term, high-temporal resolution data that are strategically distributed across ecologically-relevant abiotic gradients. Here, we quantify the distribution of SET-MH stations along the northern Gulf of Mexico coast (USA) across political boundaries (states), wetland habitats, and ecologically-relevant abiotic gradients (i.e., gradients in temperature, precipitation, elevation, and relative sea-level rise). Our analyses identify areas with high SET-MH station densities as well as areas with notable gaps. Salt marshes, intermediate elevations, and colder areas with high rainfall have a high number of stations, while salt flat ecosystems, certain elevation zones, the mangrove-marsh ecotone, and hypersaline coastal areas with low rainfall have fewer stations. Due to rapid rates of wetland loss and relative sea-level rise, the state of Louisiana has the most extensive SET-MH station network in the region, and we provide several recent examples where data from Louisiana's network have been used to assess and compare wetland vulnerability to sea-level rise. Our findings represent the first attempt to examine spatial gaps in SET-MH coverage across abiotic gradients. Our analyses can be used to transform a broadly disseminated and unplanned collection of SET-MH stations into a coordinated and strategic regional network. This regional network would provide data for predicting and preparing for the responses of coastal wetlands to accelerated sea-level rise and other aspects of global change.
Robustness of network of networks under targeted attack.
Dong, Gaogao; Gao, Jianxi; Du, Ruijin; Tian, Lixin; Stanley, H Eugene; Havlin, Shlomo
2013-05-01
The robustness of a network of networks (NON) under random attack has been studied recently [Gao et al., Phys. Rev. Lett. 107, 195701 (2011)]. Understanding how robust a NON is to targeted attacks is a major challenge when designing resilient infrastructures. We address here the question how the robustness of a NON is affected by targeted attack on high- or low-degree nodes. We introduce a targeted attack probability function that is dependent upon node degree and study the robustness of two types of NON under targeted attack: (i) a tree of n fully interdependent Erdős-Rényi or scale-free networks and (ii) a starlike network of n partially interdependent Erdős-Rényi networks. For any tree of n fully interdependent Erdős-Rényi networks and scale-free networks under targeted attack, we find that the network becomes significantly more vulnerable when nodes of higher degree have higher probability to fail. When the probability that a node will fail is proportional to its degree, for a NON composed of Erdős-Rényi networks we find analytical solutions for the mutual giant component P(∞) as a function of p, where 1-p is the initial fraction of failed nodes in each network. We also find analytical solutions for the critical fraction p(c), which causes the fragmentation of the n interdependent networks, and for the minimum average degree k[over ¯](min) below which the NON will collapse even if only a single node fails. For a starlike NON of n partially interdependent Erdős-Rényi networks under targeted attack, we find the critical coupling strength q(c) for different n. When q>q(c), the attacked system undergoes an abrupt first order type transition. When q≤q(c), the system displays a smooth second order percolation transition. We also evaluate how the central network becomes more vulnerable as the number of networks with the same coupling strength q increases. The limit of q=0 represents no dependency, and the results are consistent with the classical percolation theory of a single network under targeted attack.
Hazard Interactions and Interaction Networks (Cascades) within Multi-Hazard Methodologies
NASA Astrophysics Data System (ADS)
Gill, Joel; Malamud, Bruce D.
2016-04-01
Here we combine research and commentary to reinforce the importance of integrating hazard interactions and interaction networks (cascades) into multi-hazard methodologies. We present a synthesis of the differences between 'multi-layer single hazard' approaches and 'multi-hazard' approaches that integrate such interactions. This synthesis suggests that ignoring interactions could distort management priorities, increase vulnerability to other spatially relevant hazards or underestimate disaster risk. We proceed to present an enhanced multi-hazard framework, through the following steps: (i) describe and define three groups (natural hazards, anthropogenic processes and technological hazards/disasters) as relevant components of a multi-hazard environment; (ii) outline three types of interaction relationship (triggering, increased probability, and catalysis/impedance); and (iii) assess the importance of networks of interactions (cascades) through case-study examples (based on literature, field observations and semi-structured interviews). We further propose visualisation frameworks to represent these networks of interactions. Our approach reinforces the importance of integrating interactions between natural hazards, anthropogenic processes and technological hazards/disasters into enhanced multi-hazard methodologies. Multi-hazard approaches support the holistic assessment of hazard potential, and consequently disaster risk. We conclude by describing three ways by which understanding networks of interactions contributes to the theoretical and practical understanding of hazards, disaster risk reduction and Earth system management. Understanding interactions and interaction networks helps us to better (i) model the observed reality of disaster events, (ii) constrain potential changes in physical and social vulnerability between successive hazards, and (iii) prioritise resource allocation for mitigation and disaster risk reduction.
Participatory flood vulnerability assessment: a multi-criteria approach
NASA Astrophysics Data System (ADS)
Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian
2018-01-01
This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.
Houghton, Adele; Austin, Jessica; Beerman, Abby; Horton, Clayton
2017-01-01
Climate change represents a significant and growing threat to population health. Rural areas face unique challenges, such as high rates of vulnerable populations; economic uncertainty due to their reliance on industries that are vulnerable to climate change; less resilient infrastructure; and lower levels of access to community and emergency services than urban areas. This article fills a gap in public health practice by developing climate and health environmental public health indicators for a local public health department in a rural area. We adapted the National Environmental Public Health Tracking Network's framework for climate and health indicators to a seven-county health department in Western Kentucky. Using a three-step review process, we identified primary climate-related environmental public health hazards for the region (extreme heat, drought, and flooding) and a suite of related exposure, health outcome, population vulnerability, and environmental vulnerability indicators. Indicators that performed more poorly at the county level than at the state and national level were defined as "high vulnerability." Six to eight high vulnerability indicators were identified for each county. The local health department plans to use the results to enhance three key areas of existing services: epidemiology, public health preparedness, and community health assessment.
Quantification of Road Network Vulnerability and Traffic Impacts to Regional Landslide Hazards.
NASA Astrophysics Data System (ADS)
Postance, Benjamin; Hillier, John; Dixon, Neil; Dijkstra, Tom
2015-04-01
Slope instability represents a prevalent hazard to transport networks. In the UK regional road networks are frequently disrupted by multiple slope failures triggered during intense precipitation events; primarily due to a degree of regional homogeneity of slope materials, geomorphology and weather conditions. It is of interest to examine how different locations and combinations of slope failure impact road networks, particularly in the context of projected climate change and a 40% increase in UK road demand by 2040. In this study an extensive number (>50 000) of multiple failure event scenarios are simulated within a dynamic micro simulation to assess traffic impacts during peak flow (7 - 10 AM). Possible failure locations are selected within the county of Gloucestershire (3150 km2) using historic failure sites and British Geological Survey GeoSure data. Initial investigations employ a multiple linear regression analyses to consider the severity of traffic impacts, as measured by time, in respect of spatial and topographical network characteristics including connectivity, density and capacity in proximity to failure sites; the network distance between disruptions in multiple failure scenarios is used to consider the effects of spatial clustering. The UK Department of Transport road travel demand and UKCP09 weather projection data to 2080 provide a suitable basis for traffic simulations and probabilistic slope stability assessments. Future work will thus focus on the development of a catastrophe risk model to simulate traffic impacts under various narratives of future travel demand and slope instability under climatic change. The results of this investigation shall contribute to the understanding of road network vulnerabilities and traffic impacts from climate driven slope hazards.
Efficient Web Vulnerability Detection Tool for Sleeping Giant-Cross Site Request Forgery
NASA Astrophysics Data System (ADS)
Parimala, G.; Sangeetha, M.; AndalPriyadharsini, R.
2018-04-01
Now day’s web applications are very high in the rate of usage due to their user friendly environment and getting any information via internet but these web applications are affected by lot of threats. CSRF attack is one of the serious threats to web applications which is based on the vulnerabilities present in the normal web request and response of HTTP protocol. It is hard to detect but hence still it is present in most of the existing web applications. In CSRF attack, without user knowledge the unwanted actions on a reliable websites are forced to happen. So it is placed in OWASP’s top 10 Web Application attacks list. My proposed work is to do a real time scan of CSRF vulnerability attack in given URL of the web applications as well as local host address for any organization using python language. Client side detection of CSRF is depended on Form count which is presented in that given web site.
A Two-Factor Model of Relapse/Recurrence Vulnerability in Unipolar Depression
Farb, Norman A. S.; Irving, Julie A.; Anderson, Adam K.; Segal, Zindel V.
2015-01-01
The substantial health burden associated with Major Depressive Disorder is a product of both its high prevalence and the significant risk of relapse, recurrence and chronicity. Establishing recurrence vulnerability factors (VFs) could improve the long-term management of MDD by identifying the need for further intervention in seemingly recovered patients. We present a model of sensitization in depression vulnerability, with an emphasis on the integration of behavioral and neural systems accounts. Evidence suggests that VFs fall into two categories: dysphoric attention and dysphoric elaboration. Dysphoric attention is driven by fixation on negative life events, and is characterized behaviorally by reduced executive control, and neurally by elevated activity in the brain’s salience network. Dysphoric elaboration is driven by rumination that promotes over-general self and contextual appraisals, and is characterized behaviorally by dysfunctional attitudes, and neurally by elevated connectivity within normally-distinct prefrontal brain networks. While, at present, few prospective VF studies exist from which to catalogue a definitive neurobehavioral account, extant data support the value of the proposed two-factor model. Measuring the continued presence of these two VFs during recovery may more accurately identify remitted patients who would benefit from targeted prophylactic intervention. PMID:25688431
Structural covariance network centrality in maltreated youth with posttraumatic stress disorder
Sun, Delin; Peverill, Matthew R.; Swanson, Chelsea S.; McLaughlin, Katie A.; Morey, Rajendra A.
2018-01-01
Childhood maltreatment is associated with posttraumatic stress disorder (PTSD) and elevated rates of adolescent and adult psychopathology including major depression, bipolar disorder, substance use disorders, and other medical comorbidities. Gray matter volume changes have been found in maltreated youth with (versus without) PTSD. However, little is known about the alterations of brain structural covariance network topology derived from cortical thickness in maltreated youth with PTSD. High-resolution T1-weighted magnetic resonance imaging scans were from demographically matched maltreated youth with PTSD (N = 24), without PTSD (N =64), and non-maltreated healthy controls (n = 67). Cortical thickness data from 148 cortical regions was entered into interregional partial correlation analyses across participants. The supra-threshold correlations constituted connections in a structural brain network derived from four types of centrality measures (degree, betweenness, closeness, and eigenvector) estimated network topology and the importance of nodes. Between-group differences were determined by permutation testing. Maltreated youth with PTSD exhibited larger centrality in left anterior cingulate cortex than the other two groups, suggesting cortical network topology specific to maltreated youth with PTSD. Moreover, maltreated youth with versus without PTSD showed smaller centrality in right orbitofrontal cortex, suggesting that this may represent a vulnerability factor to PTSD following maltreatment. Longitudinal follow-up of the present results will help characterize the role that altered centrality plays in vulnerability and resilience to PTSD following childhood maltreatment. PMID:29294430
Cascading failures in interconnected networks with dynamical redistribution of loads
NASA Astrophysics Data System (ADS)
Zhao, Zhuang; Zhang, Peng; Yang, Hujiang
2015-09-01
Cascading failures of loads in isolated networks and coupled networks have been studied in the past few years. In most of the corresponding results, the topologies of the networks are destroyed. Here, we present an interconnected network model considering cascading failures based on the dynamic redistribution of flow in the networks. Compared with the results of single scale-free networks, we find that interconnected scale-free networks have higher vulnerability. Additionally, the network heterogeneity plays an important role in the robustness of interconnected networks under intentional attacks. Considering the effects of various coupling preferences, the results show that there are almost no differences. Finally, the application of our model to the Beijing interconnected traffic network, which consists of a subway network and a bus network, shows that the subway network suffers more damage under the attack. Moreover, the interconnected traffic network may be more exposed to damage after initial attacks on the bus network. These discussions are important for the design and optimization of interconnected networks.
Personal privacy, information assurance, and the threat posed by malware techology
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2006-04-01
In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.
Asad, Shadaba; Opal, Steven M
2008-01-01
Bacteria communicate extensively with each other and employ a communal approach to facilitate survival in hostile environments. A hierarchy of cell-to-cell signaling pathways regulates bacterial growth, metabolism, biofilm formation, virulence expression, and a myriad of other essential functions in bacterial populations. The notion that bacteria can signal each other and coordinate their assault patterns against susceptible hosts is now well established. These signaling networks represent a previously unrecognized survival strategy by which bacterial pathogens evade antimicrobial defenses and overwhelm the host. These quorum sensing communication signals can transgress species barriers and even kingdom barriers. Quorum sensing molecules can regulate human transcriptional programs to the advantage of the pathogen. Human stress hormones and cytokines can be detected by bacterial quorum sensing systems. By this mechanism, the pathogen can detect the physiologically stressed host, providing an opportunity to invade when the patient is most vulnerable. These rather sophisticated, microbial communication systems may prove to be a liability to pathogens as they make convenient targets for therapeutic intervention in our continuing struggle to control microbial pathogens. PMID:19040778
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno
We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less
Intrusion Prevention and Detection in Grid Computing - The ALICE Case
NASA Astrophysics Data System (ADS)
Gomez, Andres; Lara, Camilo; Kebschull, Udo
2015-12-01
Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.
Robinson, Kathryn M; Hauzy, Céline; Loeuille, Nicolas; Albrectsen, Benedicte R
2015-01-01
Nestedness and modularity are measures of ecological networks whose causative effects are little understood. We analyzed antagonistic plant–herbivore bipartite networks using common gardens in two contrasting environments comprised of aspen trees with differing evolutionary histories of defence against herbivores. These networks were tightly connected owing to a high level of specialization of arthropod herbivores that spend a large proportion of the life cycle on aspen. The gardens were separated by ten degrees of latitude with resultant differences in abiotic conditions. We evaluated network metrics and reported similar connectance between gardens but greater numbers of links per species in the northern common garden. Interaction matrices revealed clear nestedness, indicating subsetting of the bipartite interactions into specialist divisions, in both the environmental and evolutionary aspen groups, although nestedness values were only significant in the northern garden. Variation in plant vulnerability, measured as the frequency of herbivore specialization in the aspen population, was significantly partitioned by environment (common garden) but not by evolutionary origin of the aspens. Significant values of modularity were observed in all network matrices. Trait-matching indicated that growth traits, leaf morphology, and phenolic metabolites affected modular structure in both the garden and evolutionary groups, whereas extra-floral nectaries had little influence. Further examination of module configuration revealed that plant vulnerability explained considerable variance in web structure. The contrasting conditions between the two gardens resulted in bottom-up effects of the environment, which most strongly influenced the overall network architecture, however, the aspen groups with dissimilar evolutionary history also showed contrasting degrees of nestedness and modularity. Our research therefore shows that, while evolution does affect the structure of aspen–herbivore bipartite networks, the role of environmental variations is a dominant constraint. PMID:26306175
A Novel Centrality Measure for Network-wide Cyber Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sathanur, Arun V.; Haglin, David J.
In this work we propose a novel formulation that models the attack and compromise on a cyber network as a combination of two parts - direct compromise of a host and the compromise occurring through the spread of the attack on the network from a compromised host. The model parameters for the nodes are a concise representation of the host profiles that can include the risky behaviors of the associated human users while the model parameters for the edges are based on the existence of vulnerabilities between each pair of connected hosts. The edge models relate to the summary representationsmore » of the corresponding attack-graphs. This results in a formulation based on Random Walk with Restart (RWR) and the resulting centrality metric can be solved for in an efficient manner through the use of sparse linear solvers. Thus the formulation goes beyond mere topological considerations in centrality computations by summarizing the host profiles and the attack graphs into the model parameters. The computational efficiency of the method also allows us to also quantify the uncertainty in the centrality measure through Monte Carlo analysis.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Sangkeun; Chen, Liangzhe; Duan, Sisi
Abstract Critical Infrastructures (CIs) such as energy, water, and transportation are complex networks that are crucial for sustaining day-to-day commodity flows vital to national security, economic stability, and public safety. The nature of these CIs is such that failures caused by an extreme weather event or a man-made incident can trigger widespread cascading failures, sending ripple effects at regional or even national scales. To minimize such effects, it is critical for emergency responders to identify existing or potential vulnerabilities within CIs during such stressor events in a systematic and quantifiable manner and take appropriate mitigating actions. We present here amore » novel critical infrastructure monitoring and analysis system named URBAN-NET. The system includes a software stack and tools for monitoring CIs, pre-processing data, interconnecting multiple CI datasets as a heterogeneous network, identifying vulnerabilities through graph-based topological analysis, and predicting consequences based on what-if simulations along with visualization. As a proof-of-concept, we present several case studies to show the capabilities of our system. We also discuss remaining challenges and future work.« less
Scada Malware, a Proof of Concept
NASA Astrophysics Data System (ADS)
Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and Network technologies into such complex critical systems. Of particular interest are the set of vulnerabilities related to the class of communication protocols normally known as “SCADA” protocols, under which fall all the communication protocols used to remotely control the RTU devices of an industrial system. In this paper we present a proof of concept of the potential effects of a set of computer malware specifically designed and created in order to impact, by taking advantage of some vulnerabilities of the ModBUS protocol, on a typical Supervisory Control and Data Acquisition system.
SFTP: A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET
NASA Astrophysics Data System (ADS)
KumarRout, Jitendra; Kumar Bhoi, Sourav; Kumar Panda, Sanjaya
2013-02-01
Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by dropping the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackhole attack in the network. The three phases used in SFTP algorithm are designing of coverage area to find the area of coverage, Network Connection algorithm to design a fault-tolerant model and Route Discovery algorithm to discover the route and data delivery from source to destination. SFTP gives better network performance by making the network fault free.
Analysis, calculation and utilization of the k-balance attribute in interdependent networks
NASA Astrophysics Data System (ADS)
Liu, Zheng; Li, Qing; Wang, Dan; Xu, Mingwei
2018-05-01
Interdependent networks, where two networks depend on each other, are becoming more and more significant in modern systems. From previous work, it can be concluded that interdependent networks are more vulnerable than a single network. The robustness in interdependent networks deserves special attention. In this paper, we propose a metric of robustness from a new perspective-the balance. First, we define the balance-coefficient of the interdependent system. Based on precise analysis and derivation, we prove some significant theories and provide an efficient algorithm to compute the balance-coefficient. Finally, we propose an optimal solution to reduce the balance-coefficient to enhance the robustness of the given system. Comprehensive experiments confirm the efficiency of our algorithms.
On securing wireless sensor network--novel authentication scheme against DOS attacks.
Raja, K Nirmal; Beno, M Marsaline
2014-10-01
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
Sea level rise impacts on wastewater treatment systems along the U.S. coasts
NASA Astrophysics Data System (ADS)
Hummel, M.; Berry, M.; Stacey, M. T.
2017-12-01
As sea levels rise, coastal communities will experience more frequent and persistent nuisance flooding, and some low-lying areas may be permanently inundated. Critical components of lifeline infrastructure networks in these areas are also at risk of flooding, which could cause significant service disruptions that extend beyond the flooded zone. Thus, identifying critical infrastructure components that are vulnerable to sea level rise is an important first step in developing targeted investment in protective actions and enhancing the overall resilience of coastal communities. Wastewater treatment plants are typically located at low elevations near the coastline to minimize the cost of collecting consumed water and discharging treated effluent, which makes them particularly susceptible to coastal flooding. For this analysis, we used geographic information systems to assess the vulnerability of wastewater infrastructure to various sea level rise projections at the national level. We then estimated the number of people who would lose wastewater services, which could be more than three times as high as previous predictions of the number of people at risk of direct flooding due to sea level rise. We also considered several case studies of wastewater infrastructure in mid-sized cities to determine how topography and system configuration (centralized versus distributed) impact vulnerability. Overall, this analysis highlights the widespread vulnerability of wastewater infrastructure in the U.S. and demonstrates that local disruptions to infrastructure networks may have far-ranging impacts on areas that do not experience direct flooding.
Risk Mitigation for Highway and Railway Bridges
DOT National Transportation Integrated Search
2009-02-01
Performance of the transportation network strongly depends on the performance of bridges. Bridges constitute a vital part of the transportation infrastructure system and they are vulnerable to extreme events such as natural disasters (i.e., hurricane...
Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens
NASA Astrophysics Data System (ADS)
Chandrakant, N.; Shenoy, P. Deepa; Venugopal, K. R.; Patnaik, L. M.
A rapid increase of wireless networks and mobile computing applications has changed the landscape of network security. A MANET is more susceptible to the attacks than wired network. As a result, attacks with malicious intent have been and will be devised to take advantage of these vulnerabilities and to cripple the MANET operation. Hence we need to search for new architecture and mechanisms to protect the wireless networks and mobile computing applications. In this paper, we examine the nodes that come under the vicinity of base node and members of the network and communication is provided to genuine nodes only. It is found that the proposed algorithm is a effective algorithm for security in MANETs.
Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade
Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.
Routing architecture and security for airborne networks
NASA Astrophysics Data System (ADS)
Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato
2009-05-01
Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.
U.S. EPA is using a landscape ecology approach to assess the ecological/hydrologic functions and related human values of depressional wetlands along coastal Texas, considered to be vulnerable to human disturbance. Many of those wetlands may be at high risk because of recent court...
Climate change and vulnerability of bull trout (Salvelinus confluentus) in a fire-prone landscape.
Falke, Jeffrey A.; Flitcroft, Rebecca L; Dunham, Jason B.; McNyset, Kristina M.; Hessburg, Paul F.; Reeves, Gordon H.
2015-01-01
Linked atmospheric and wildfire changes will complicate future management of native coldwater fishes in fire-prone landscapes, and new approaches to management that incorporate uncertainty are needed to address this challenge. We used a Bayesian network (BN) approach to evaluate population vulnerability of bull trout (Salvelinus confluentus) in the Wenatchee River basin, Washington, USA, under current and future climate and fire scenarios. The BN was based on modeled estimates of wildfire, water temperature, and physical habitat prior to, and following, simulated fires throughout the basin. We found that bull trout population vulnerability depended on the extent to which climate effects can be at least partially offset by managing factors such as habitat connectivity and fire size. Moreover, our analysis showed that local management can significantly reduce the vulnerability of bull trout to climate change given appropriate management actions. Tools such as our BN that explicitly integrate the linked nature of climate and wildfire, and incorporate uncertainty in both input data and vulnerability estimates, will be vital in effective future management to conserve native coldwater fishes.
Mehta, Mitul A.; Chatzieffraimidou, Antonia; Curtis, Charles; Xu, Xiaohui; Breen, Gerome; Simmons, Andrew; Mirza, Kah; Rubia, Katya
2017-01-01
Childhood maltreatment is associated with attention deficits. We examined the effect of childhood abuse and abuse-by-gene (5-HTTLPR, MAOA, FKBP5) interaction on functional brain connectivity during sustained attention in medication/drug-free adolescents. Functional connectivity was compared, using generalised psychophysiological interaction (gPPI) analysis of functional magnetic resonance imaging (fMRI) data, between 21 age-and gender-matched adolescents exposed to severe childhood abuse and 27 healthy controls, while they performed a parametrically modulated vigilance task requiring target detection with a progressively increasing load of sustained attention. Behaviourally, participants exposed to childhood abuse had increased omission errors compared to healthy controls. During the most challenging attention condition abused participants relative to controls exhibited reduced connectivity, with a left-hemispheric bias, in typical fronto-parietal attention networks, including dorsolateral, rostromedial and inferior prefrontal and inferior parietal regions. Abuse-related connectivity abnormalities were exacerbated in individuals homozygous for the risky C-allele of the single nucleotide polymorphism rs3800373 of the FK506 Binding Protein 5 (FKBP5) gene. Findings suggest that childhood abuse is associated with decreased functional connectivity in fronto-parietal attention networks and that the FKBP5 genotype moderates neurobiological vulnerability to abuse. These findings represent a first step towards the delineation of abuse-related neurofunctional connectivity abnormalities, which hopefully will facilitate the development of specific treatment strategies for victims of childhood maltreatment. PMID:29190830
Hindhede, Anette Lykke; Aagaard-Hansen, Jens
2017-03-01
This article provides an example of the application of social network analysis method to assess community participation thereby strengthening planning and implementation of health promotion programming. Community health promotion often takes the form of services that reach out to or are located within communities. The concept of community reflects the idea that people's behavior and well-being are influenced by interaction with others, and here, health promotion requires participation and local leadership to facilitate transmission and uptake of interventions for the overall community to achieve social change. However, considerable uncertainty exists over exact levels of participation in these interventions. The article draws on a mixed methods research within a community development project in a vulnerable neighborhood of a town in Denmark. It presents a detailed analysis of the way in which social network analysis can be used as a tool to display participation and nonparticipation in community development and health promotion activities, to help identify capacities and assets, mobilize resources, and finally to evaluate the achievements. The article concludes that identification of interpersonal ties among people who know one another well as well as more tenuous relationships in networks can be used by community development workers to foster greater cohesion and cooperation within an area.
Responses to a Self-Presented Suicide Attempt in Social Media
Fu, King-wa; Cheng, Qijin; Wong, Paul W.C.; Yip, Paul S. F.
2014-01-01
Background The self-presentation of suicidal acts in social media has become a public health concern. Aims This article centers on a Chinese microblogger who posted a wrist-cutting picture that was widely circulated in Chinese social media in 2011. This exploratory study examines written reactions of a group of Chinese microbloggers exposed to the post containing a self-harming message and photo. In addition, we investigate the pattern of information diffusion via a social network. Methods We systematically collected and analyzed 5,971 generated microblogs and the network of information diffusion. Results We found that a significant portion of written responses (36.6%) could help vulnerable netizens by providing peer-support and calls for help. These responses were reposted and diffused via an online social network with markedly more clusters of users – and at a faster pace – than a set of randomly generated networks. Conclusions We conclude that social media can be a double-edged sword: While it may contagiously affect others by spreading suicidal thoughts and acts, it may also play a positive role by assisting people at risk for suicide, providing rescue or support. More research is needed to learn how suicidally vulnerable people interact with online suicide information, and how we can effectively intervene. PMID:23871954
NASA Astrophysics Data System (ADS)
Zhang, Weihong.; Zhao, Yongsheng; Hong, Mei; Guo, Xiaodong
2009-04-01
Groundwater pollution usually is complex and concealed, remediation of which is difficult, high cost, time-consuming, and ineffective. An early warning system for groundwater pollution is needed that detects groundwater quality problems and gets the information necessary to make sound decisions before massive groundwater quality degradation occurs. Groundwater pollution early warning were performed by considering comprehensively the current groundwater quality, groundwater quality varying trend and groundwater pollution risk . The map of the basic quality of the groundwater was obtained by fuzzy comprehensive evaluation or BP neural network evaluation. Based on multi-annual groundwater monitoring datasets, Water quality state in sometime of the future was forecasted using time-sequenced analyzing methods. Water quality varying trend was analyzed by Spearman's rank correlative coefficient.The relative risk map of groundwater pollution was estimated through a procedure that identifies, cell by cell,the values of three factors, that is inherent vulnerability, load risk of pollution source and contamination hazard. DRASTIC method was used to assess inherent vulnerability of aquifer. Load risk of pollution source was analyzed based on the potential of contamination and pollution degree. Assessment index of load risk of pollution source which involves the variety of pollution source, quantity of contaminants, releasing potential of pollutants, and distance were determined. The load risks of all sources considered by GIS overlay technology. Early warning model of groundwater pollution combined with ComGIS technology organically, the regional groundwater pollution early-warning information system was developed, and applied it into Qiqiha'er groundwater early warning. It can be used to evaluate current water quality, to forecast water quality changing trend, and to analyze space-time influencing range of groundwater quality by natural process and human activities. Keywords: groundwater pollution, early warning, aquifer vulnerability, pollution load, pollution risk, ComGIS
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
A smart indoor air quality sensor network
NASA Astrophysics Data System (ADS)
Wen, Jin
2006-03-01
The indoor air quality (IAQ) has an important impact on public health. Currently, the indoor air pollution, caused by gas, particle, and bio-aerosol pollutants, is considered as the top five environmental risks to public health and has an estimated cost of $2 billion/year due to medical cost and lost productivity. Furthermore, current buildings are especially vulnerable for chemical and biological warfare (CBW) agent contamination because the central air conditioning and ventilation system serve as a nature carrier to spread the released agent from one location to the whole indoor environment within a short time period. To assure the IAQ and safety for either new or existing buildings, real time comprehensive IAQ and CBW measurements are needed. With the development of new sensing technologies, economic and reliable comprehensive IAQ and CBW sensors become promising. However, few studies exist that examine the design and evaluation issues related to IAQ and CBW sensor network. In this paper, relevant research areas including IAQ and CBW sensor development, demand control ventilation, indoor CBW sensor system design, and sensor system design for other areas such as water system protection, fault detection and diagnosis, are reviewed and summarized. Potential research opportunities for IAQ and CBW sensor system design and evaluation are discussed.
Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar
Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
Protecting Dynamic Mobile Agent against Denial of Service Attacks
NASA Astrophysics Data System (ADS)
Aggarwal, Mayank; Nipur, Pallavi
2010-11-01
Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.
McCrory, Eamon J.; Puetz, Vanessa B.; Maguire, Eleanor A.; Mechelli, Andrea; Palmer, Amy; Gerin, Mattia I.; Kelly, Philip A.; Koutoufa, Iakovina; Viding, Essi
2017-01-01
Background Altered autobiographical memory (ABM) functioning has been implicated in the pathogenesis of depression and post-traumatic stress disorder and may represent one mechanism by which childhood maltreatment elevates psychiatric risk. Aims To investigate the impact of childhood maltreatment on ABM functioning. Method Thirty-four children with documented maltreatment and 33 matched controls recalled specific ABMs in response to emotionally valenced cue words during functional magnetic resonance imaging. Results Children with maltreatment experience showed reduced hippocampal and increased middle temporal and parahippocampal activation during positive ABM recall compared with peers. During negative ABM recall they exhibited increased amygdala activation, and greater amygdala connectivity with the salience network. Conclusions Childhood maltreatment is associated with altered ABM functioning, specifically reduced activation in areas encoding specification of positive memories, and greater activation of the salience network for negative memories. This pattern may confer latent vulnerability to future depression and post-traumatic stress disorder. PMID:28882830
Method and tool for network vulnerability analysis
Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM
2006-03-14
A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."
Climate Vulnerability and Human Migration in Global Perspective
Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.
2018-01-01
The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262
Climate Vulnerability and Human Migration in Global Perspective.
Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J
2017-05-01
The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.
Gender, Age, Social differences and Climate Change
NASA Astrophysics Data System (ADS)
Petrucci, Alessandra; Salvini, Silvana
2017-04-01
Climate and society evolve together in a manner that could place already vulnerable areas and their population at a greater risk to extreme weather events. While efforts have been devoted to better planning preparedness and responses to weather extremes, the interactions among various stakeholders who deal with hazard mitigation and response, and the community members, also related with gender and age differences, are not completely understood. In contrast to physical vulnerability, which arises from the potential for environmental extremes to create adverse physiological changes, social vulnerability arises from the potential for these extreme events to cause changes in people's behavior. People can vary in their potential for injury to themselves and their families. They also vary in the potential for destruction of their homes and workplaces, as well as the destruction of the transportation systems and locations for shopping and recreation they use in their daily activities. It is important to recognize that social vulnerability is not randomly distributed either demographically or geographically. In particular, the social vulnerability arising from a lack of psychological resilience, social network integration, economic assets, and political power vary across demographic groups. Some of these components of social vulnerability can be predicted by demographic characteristics such as gender, age, education, income, and ethnicity. This review explores the gender and social difference dimensions of vulnerability and adaptive capacity in relation to climate change.
Plummer, Niel; Busenberg, E.; Eberts, S.M.; Bexfield, L.M.; Brown, C.J.; Fahlquist, L.S.; Katz, B.G.; Landon, M.K.
2008-01-01
Concentrations of halogenated volatile organic compounds (VOCs) were determined by gas chromatography (GC) with an electron-capture detector (GC-ECD) and by gas chromatography with mass spectrometry (GC-MS) in 109 groundwater samples from five study areas in the United States. In each case, the untreated water sample was used for drinking-water purposes or was from a monitoring well in an area near a drinking-water source. The minimum detection levels (MDLs) for 25 VOCs that were identified in GC-ECD chromatograms, typically, were two to more than four orders of magnitude below the GC-MS MDLs. At least six halogenated VOCs were detected in all of the water samples analyzed by GC-ECD, although one or more VOCs were detected in only 43% of the water samples analyzed by GC-MS. In nearly all of the samples, VOC concentrations were very low and presented no known health risk. Most of the low-level VOC detections indicated post-1940s recharge, or mixtures of recharge that contained a fraction of post-1940s water. Concentrations of selected halogenated VOCs in groundwater from natural and anthropogenic atmospheric sources were estimated and used to recognize water samples that are being impacted by nonatmospheric sources. A classification is presented to perform vulnerability assessments at the scale of individual wells using the number of halogenated VOC detections and total dissolved VOC concentrations in samples of untreated drinking water. The low-level VOC detections are useful in vulnerability assessments, particularly for samples in which no VOCs are detected by GC-MS analysis.
Intervention Strategies for Populations at Risk: A Behavioral Approach to Prevention.
ERIC Educational Resources Information Center
Hartman, Lorne M.; Poser, Ernest G.
This report presents a preliminary series of investigations dealing with the detection of populations at psychological risk. The investigation relies primarily on the variable of vulnerability, as defined empirically by self-esteem, psychological discomfort, and social skills. Two vulnerability groups, high (HV) and low(LV) are compared on their…
Neural networks underlying trait aggression depend on MAOA gene alleles.
Klasen, Martin; Wolf, Dhana; Eisner, Patrick D; Habel, Ute; Repple, Jonathan; Vernaleken, Ingo; Schlüter, Thorben; Eggermann, Thomas; Zerres, Klaus; Zepf, Florian D; Mathiak, Klaus
2018-03-01
Low expressing alleles of the MAOA gene (MAOA-L) have been associated with an increased risk for developing an aggressive personality. This suggests an MAOA-L-specific neurobiological vulnerability associated with trait aggression. The neural networks underlying this vulnerability are unknown. The present study investigated genotype-specific associations between resting state brain networks and trait aggression (Buss-Perry Aggression Questionnaire) in 82 healthy Caucasian males. Genotype influences on aggression-related networks were studied for intrinsic and seed-based brain connectivity. Intrinsic connectivity was higher in the ventromedial prefrontal cortex (VMPFC) of MAOA-L compared to high expressing allele (MAOA-H) carriers. Seed-based connectivity analyses revealed genotype differences in the functional involvement of this region. MAOA genotype modulated the relationship between trait aggression and VMPFC connectivity with supramarginal gyrus (SMG) and areas of the default mode network (DMN). Separate analyses for the two groups were performed to better understand how the genotype modulated the relationship between aggression and brain networks. They revealed a positive correlation between VMPFC connectivity and aggression in right angular gyrus (AG) and a negative correlation in right SMG in the MAOA-L group. No such effect emerged in the MAOA-H carriers. The results indicate a particular relevance of VMPFC for aggression in MAOA-L carriers; in specific, a detachment from the DMN along with a strengthened coupling to the AG seems to go along with lower trait aggression. MAOA-L carriers may thus depend on a synchronization of emotion regulation systems (VMPFC) with core areas of empathy (SMG) to prevent aggression.
Salience Network and Parahippocampal Dopamine Dysfunction in Memory-Impaired Parkinson Disease
Christopher, Leigh; Duff-Canning, Sarah; Koshimori, Yuko; Segura, Barbara; Boileau, Isabelle; Chen, Robert; Lang, Anthony E.; Houle, Sylvain; Rusjan, Pablo; Strafella, Antonio P.
2016-01-01
Objective Patients with Parkinson disease (PD) and mild cognitive impairment (MCI) are vulnerable to dementia and frequently experience memory deficits. This could be the result of dopamine dysfunction in corticostriatal networks (salience, central executive networks, and striatum) and/or the medial temporal lobe. Our aim was to investigate whether dopamine dysfunction in these regions contributes to memory impairment in PD. Methods We used positron emission tomography imaging to compare D2 receptor availability in the cortex and striatal (limbic and associative) dopamine neuron integrity in 4 groups: memory-impaired PD (amnestic MCI; n=9), PD with nonamnestic MCI (n=10), PD without MCI (n=11), and healthy controls (n=14). Subjects were administered a full neuropsychological test battery for cognitive performance. Results Memory-impaired patients demonstrated more significant reductions in D2 receptor binding in the salience network (insular cortex and anterior cingulate cortex [ACC] and the right parahippocampal gyrus [PHG]) compared to healthy controls and patients with no MCI. They also presented reductions in the right insula and right ACC compared to nonamnestic MCI patients. D2 levels were correlated with memory performance in the right PHG and left insula of amnestic patients and with executive performance in the bilateral insula and left ACC of all MCI patients. Associative striatal dopamine denervation was significant in all PD patients. Interpretation Dopaminergic differences in the salience network and the medial temporal lobe contribute to memory impairment in PD. Furthermore, these findings indicate the vulnerability of the salience network in PD and its potential role in memory and executive dysfunction. PMID:25448687
Passive and Active Analysis in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)
Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.
Cascade-based attacks on complex networks
NASA Astrophysics Data System (ADS)
Motter, Adilson E.; Lai, Ying-Cheng
2002-12-01
We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.
Immunization of complex networks
NASA Astrophysics Data System (ADS)
Pastor-Satorras, Romualdo; Vespignani, Alessandro
2002-03-01
Complex networks such as the sexual partnership web or the Internet often show a high degree of redundancy and heterogeneity in their connectivity properties. This peculiar connectivity provides an ideal environment for the spreading of infective agents. Here we show that the random uniform immunization of individuals does not lead to the eradication of infections in all complex networks. Namely, networks with scale-free properties do not acquire global immunity from major epidemic outbreaks even in the presence of unrealistically high densities of randomly immunized individuals. The absence of any critical immunization threshold is due to the unbounded connectivity fluctuations of scale-free networks. Successful immunization strategies can be developed only by taking into account the inhomogeneous connectivity properties of scale-free networks. In particular, targeted immunization schemes, based on the nodes' connectivity hierarchy, sharply lower the network's vulnerability to epidemic attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rice, Mark J.; Bonebrake, Christopher A.; Dayley, Greg K.
Inter-Control Center Communications Protocol (ICCP), defined by the IEC 60870-6 TASE.2 standard, was developed to enable data exchange over wide area networks between electric system entities, including utility control centers, Independent System Operators (ISOs), Regional Transmission Operators (RTOs) and Independent Power Producers (IPP) also known as Non-Utility Generators (NUG). ICCP is an unprotected protocol, and as a result is vulnerable to such actions as integrity violation, interception or alteration, spoofing, and eavesdropping. Because of these vulnerabilities with unprotected ICCP communication, security enhancements, referred to as Secure ICCP, have been added and are included in the ICCP products that utilities havemore » received since 2003 when the standard was defined. This has resulted in an ICCP product whose communication can be encrypted and authenticated to address these vulnerabilities.« less
2017-01-01
Climate change represents a significant and growing threat to population health. Rural areas face unique challenges, such as high rates of vulnerable populations; economic uncertainty due to their reliance on industries that are vulnerable to climate change; less resilient infrastructure; and lower levels of access to community and emergency services than urban areas. This article fills a gap in public health practice by developing climate and health environmental public health indicators for a local public health department in a rural area. We adapted the National Environmental Public Health Tracking Network's framework for climate and health indicators to a seven-county health department in Western Kentucky. Using a three-step review process, we identified primary climate-related environmental public health hazards for the region (extreme heat, drought, and flooding) and a suite of related exposure, health outcome, population vulnerability, and environmental vulnerability indicators. Indicators that performed more poorly at the county level than at the state and national level were defined as “high vulnerability.” Six to eight high vulnerability indicators were identified for each county. The local health department plans to use the results to enhance three key areas of existing services: epidemiology, public health preparedness, and community health assessment. PMID:28352286
NASA Technical Reports Server (NTRS)
Ganzy, Ethan G.
2014-01-01
All devices attached to the NASA KSC network are subject to security vulnerability scanning and/or penetration testing. In today's changing environment, vulnerable and/or unprotected systems can easily be overlooked. Systems that are not properly managed can become a potential threat to the operational integrity of our systems and networks. This includes all NASA (internal and external) information systems within NASA KSC Internet Protocol (IP) address space, and NASA KSC facilities. The Office of the Chief Information Officer (OCIO) recommends that all NASA Centers and information systems be subject to penetration testing on a regular interval in accordance with the guidelines identified by the National Institute of Standards and Technology (NIST). (ITS-HBK-2810.04-02A) Protecting information and equipment at NASA is an area of increasing concern. In addition to the CPU's on the network; Supervisory, Control and Data Acquisition (SCADA) systems are especially vulnerable because these systems have lacked standards, use embedded controllers with little computational power and informal software, are connected to physical processes, have few operators, and are increasingly also being connected to corporate networks. The scope of work is comprised of several individual components which together build upon previous work by Drew Branch, NASA KSC Intern. The Pwn Plug is the selected COTS (Commercial-Off-The-Shelf) device chosen to test simplification of mandatory IT Security tasks. The device will be utilized to provide services to NASA KSC and enable an assessment of infrastructure soundness and regulatory compliance in an efficient, economical, and business responsive manner. The Pwn Plug is designed as a pen testing appliance which provides a hardware platform that can support commercial penetration testing efforts at significantly reduced costs. The expected outcomes are: 1) External Penetration Testing, 2) Social Engineering, 3) Procedural Documentation, 4) Recommended Remediation Action Plan, 5) System Retest & Remediation Attestation and 6) Final Reports, out briefing and Presentation. Due to physical and material constraints beyond intern and mentor control, the project was redefined as a working pen-test scenario. Limitations of lab availability and tools dictated an academic exercise. This report was developed within the scenario guidelines suggested by the project mentor. The guidelines were to be creative in developing a Pen Test program for a client.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sadi, Mohammad A. H.; Dasgupta, Dipankar; Ali, Mohammad Hassan
The important backbone of the smart grid is the cyber/information infrastructure, which is primarily used to communicate with different grid components. A smart grid is a complex cyber physical system containing a numerous and variety number of sources, devices, controllers and loads. Therefore, the smart grid is vulnerable to grid related disturbances. For such dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and Opnet based co-simulated platform to carry out a cyber-intrusion in cyber network for modern power systems and the smart grid. The IEEE 30 bus power system model is used tomore » demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack. Different disturbance situations in the considered test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less
2012-02-06
Event Interface Custom ASCII JSS Client Y (Spectrum) 3.2 8 IT Infrastructure Performance Data/Vulnerability Assessment eHealth , Spectrum NSM...monitoring of infrastructure servers.) The Concord product line. Concord products ( eHealth and Spectrum) can provide both real-time and historical...Network and Systems Management (NSM) • Unicenter Asset Management • Spectrum • eHealth • Centennial Discovery Table 12 summarizes the the role of
ARSENAL: A Cross Layer Architecture for Secure Resilient Tactical Mobile AdHoc Networks
2016-01-21
stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings
ARSENAL: A Cross Layer Architecture for SecureResilient Tactical Mobile AdHoc Networks
2016-01-21
stations separated by 0.5 to 1 km can be coherently measured to a single mobile subscriber using LTE signaling. These are the first measurements of...undertake three parallel but inter-coupled tasks geared towards a) performing measurements via real deployments and enhancing our understanding of layer...dependencies and vulnerabilities in mobile ad hoc networks; these measurements will be on existing testbeds at The views, opinions and/or findings
The Oncogenic Palmitoyi-Protein Network in Prostate Cancer
2015-06-01
obesity drug, Ortistat, which inhibits the enzyme fatty acid synthase (FASN), has been shown to slow the growth of human prostate tumors in mice...Orlistat, an FDA-approved anti- obesity drug, suppresses the growth of human prostate tumors in nude mice.5 Despite these advances, the role of lipid...We also tested in vivo whether this network is vulnerable to an intervention that employs a dietary strategy in combination with an FDA-approved
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Resilience of natural gas networks during conflicts, crises and disruptions.
Carvalho, Rui; Buzna, Lubos; Bono, Flavio; Masera, Marcelo; Arrowsmith, David K; Helbing, Dirk
2014-01-01
Human conflict, geopolitical crises, terrorist attacks, and natural disasters can turn large parts of energy distribution networks offline. Europe's current gas supply network is largely dependent on deliveries from Russia and North Africa, creating vulnerabilities to social and political instabilities. During crises, less delivery may mean greater congestion, as the pipeline network is used in ways it has not been designed for. Given the importance of the security of natural gas supply, we develop a model to handle network congestion on various geographical scales. We offer a resilient response strategy to energy shortages and quantify its effectiveness for a variety of relevant scenarios. In essence, Europe's gas supply can be made robust even to major supply disruptions, if a fair distribution strategy is applied.
NASA Technical Reports Server (NTRS)
Estes, N. A. 3rd; Michaud, G.; Zipes, D. P.; El-Sherif, N.; Venditti, F. J.; Rosenbaum, D. S.; Albrecht, P.; Wang, P. J.; Cohen, R. J.
1997-01-01
This investigation was performed to evaluate the feasibility of detecting repolarization alternans with the heart rate elevated with a bicycle exercise protocol. Sensitive spectral signal-processing techniques are able to detect beat-to-beat alternation of the amplitude of the T wave, which is not visible on standard electrocardiogram. Previous animal and human investigations using atrial or ventricular pacing have demonstrated that T-wave alternans is a marker of vulnerability to ventricular arrhythmias. Using a spectral analysis technique incorporating noise reduction signal-processing software, we evaluated electrical alternans at rest and with the heart rate elevated during a bicycle exercise protocol. In this study we defined optimal criteria for electrical alternans to separate patients from those without inducible arrhythmias. Alternans and signal-averaged electrocardiographic results were compared with the results of vulnerability to ventricular arrhythmias as defined by induction of sustained ventricular tachycardia or fibrillation at electrophysiologic evaluation. In 27 patients alternans recorded at rest and with exercise had a sensitivity of 89%, specificity of 75%, and overall clinical accuracy of 80% (p <0.003). In this patient population the signal-averaged electrocardiogram was not a significant predictor of arrhythmia vulnerability. This is the first study to report that repolarization alternans can be detected with heart rate elevated with a bicycle exercise protocol. Alternans measured using this technique is an accurate predictor of arrhythmia inducibility.
Matos, Vanina; Barcellos, Christovam; Camargo, Luiz Octávio de Lima
2013-01-01
This article examines how a group of tourists perceives health issues related to safety, prevention and health care during their travels. Interviews were conducted with Brazilian tourists visiting the city of Rio de Janeiro, as well as local residents leaving the city on trips. The interviews were analyzed in accordance with the dimensions of vulnerability, information, prevention and health care, from which vulnerability emerged as a category of analysis. The reports of the trajectory of the tourists made it possible to identify problems and opportunities that could be used by the health sector for actions of prevention and promotion. The means of transport determines the trajectory of tourists and their security alternatives. Traveling in groups and visiting tourist attractions are seen as protective factors, which reinforces the role of information and social support networks as resources used by tourists in the absence of specific policies geared to this highly mobile and vulnerable population group.
Real-time method for establishing a detection map for a network of sensors
Nguyen, Hung D; Koch, Mark W; Giron, Casey; Rondeau, Daniel M; Russell, John L
2012-09-11
A method for establishing a detection map of a dynamically configurable sensor network. This method determines an appropriate set of locations for a plurality of sensor units of a sensor network and establishes a detection map for the network of sensors while the network is being set up; the detection map includes the effects of the local terrain and individual sensor performance. Sensor performance is characterized during the placement of the sensor units, which enables dynamic adjustment or reconfiguration of the placement of individual elements of the sensor network during network set-up to accommodate variations in local terrain and individual sensor performance. The reconfiguration of the network during initial set-up to accommodate deviations from idealized individual sensor detection zones improves the effectiveness of the sensor network in detecting activities at a detection perimeter and can provide the desired sensor coverage of an area while minimizing unintentional gaps in coverage.
Structural covariance network centrality in maltreated youth with posttraumatic stress disorder.
Sun, Delin; Peverill, Matthew R; Swanson, Chelsea S; McLaughlin, Katie A; Morey, Rajendra A
2018-03-01
Childhood maltreatment is associated with posttraumatic stress disorder (PTSD) and elevated rates of adolescent and adult psychopathology including major depression, bipolar disorder, substance use disorders, and other medical comorbidities. Gray matter volume changes have been found in maltreated youth with (versus without) PTSD. However, little is known about the alterations of brain structural covariance network topology derived from cortical thickness in maltreated youth with PTSD. High-resolution T1-weighted magnetic resonance imaging scans were from demographically matched maltreated youth with PTSD (N = 24), without PTSD (N = 64), and non-maltreated healthy controls (n = 67). Cortical thickness data from 148 cortical regions was entered into interregional partial correlation analyses across participants. The supra-threshold correlations constituted connections in a structural brain network derived from four types of centrality measures (degree, betweenness, closeness, and eigenvector) estimated network topology and the importance of nodes. Between-group differences were determined by permutation testing. Maltreated youth with PTSD exhibited larger centrality in left anterior cingulate cortex than the other two groups, suggesting cortical network topology specific to maltreated youth with PTSD. Moreover, maltreated youth with versus without PTSD showed smaller centrality in right orbitofrontal cortex, suggesting that this may represent a vulnerability factor to PTSD following maltreatment. Longitudinal follow-up of the present results will help characterize the role that altered centrality plays in vulnerability and resilience to PTSD following childhood maltreatment. Copyright © 2017. Published by Elsevier Ltd.
A common brain network links development, aging, and vulnerability to disease.
Douaud, Gwenaëlle; Groves, Adrian R; Tamnes, Christian K; Westlye, Lars Tjelta; Duff, Eugene P; Engvig, Andreas; Walhovd, Kristine B; James, Anthony; Gass, Achim; Monsch, Andreas U; Matthews, Paul M; Fjell, Anders M; Smith, Stephen M; Johansen-Berg, Heidi
2014-12-09
Several theories link processes of development and aging in humans. In neuroscience, one model posits for instance that healthy age-related brain degeneration mirrors development, with the areas of the brain thought to develop later also degenerating earlier. However, intrinsic evidence for such a link between healthy aging and development in brain structure remains elusive. Here, we show that a data-driven analysis of brain structural variation across 484 healthy participants (8-85 y) reveals a largely--but not only--transmodal network whose lifespan pattern of age-related change intrinsically supports this model of mirroring development and aging. We further demonstrate that this network of brain regions, which develops relatively late during adolescence and shows accelerated degeneration in old age compared with the rest of the brain, characterizes areas of heightened vulnerability to unhealthy developmental and aging processes, as exemplified by schizophrenia and Alzheimer's disease, respectively. Specifically, this network, while derived solely from healthy subjects, spatially recapitulates the pattern of brain abnormalities observed in both schizophrenia and Alzheimer's disease. This network is further associated in our large-scale healthy population with intellectual ability and episodic memory, whose impairment contributes to key symptoms of schizophrenia and Alzheimer's disease. Taken together, our results suggest that the common spatial pattern of abnormalities observed in these two disorders, which emerge at opposite ends of the life spectrum, might be influenced by the timing of their separate and distinct pathological processes in disrupting healthy cerebral development and aging, respectively.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-12-15
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Structural and functional properties of spatially embedded scale-free networks.
Emmerich, Thorsten; Bunde, Armin; Havlin, Shlomo
2014-06-01
Scale-free networks have been studied mostly as non-spatially embedded systems. However, in many realistic cases, they are spatially embedded and these constraints should be considered. Here, we study the structural and functional properties of a model of scale-free (SF) spatially embedded networks. In our model, both the degree and the length of links follow power law distributions as found in many real networks. We show that not all SF networks can be embedded in space and that the largest degree of a node in the network is usually smaller than in nonembedded SF networks. Moreover, the spatial constraints (each node has only few neighboring nodes) introduce degree-degree anticorrelations (disassortativity) since two high degree nodes cannot stay close in space. We also find significant effects of space embedding on the hopping distances (chemical distance) and the vulnerability of the networks.
Business cycles' correlation and systemic risk of the Japanese supplier-customer network.
Krichene, Hazem; Chakraborty, Abhijit; Inoue, Hiroyasu; Fujiwara, Yoshi
2017-01-01
This work aims to study and explain the business cycle correlations of the Japanese production network. We consider the supplier-customer network, which is a directed network representing the trading links between Japanese firms (links from suppliers to customers). The community structure of this network is determined by applying the Infomap algorithm. Each community is defined by its GDP and its associated business cycle. Business cycle correlations between communities are estimated based on copula theory. Then, based on firms' attributes and network topology, these correlations are explained through linear econometric models. The results show strong evidence of business cycle correlations in the Japanese production network. A significant systemic risk is found for high negative or positive shocks. These correlations are explained mainly by the sector and by geographic similarities. Moreover, our results highlight the higher vulnerability of small communities and small firms, which is explained by the disassortative mixing of the production network.
Business cycles’ correlation and systemic risk of the Japanese supplier-customer network
Chakraborty, Abhijit; Inoue, Hiroyasu; Fujiwara, Yoshi
2017-01-01
This work aims to study and explain the business cycle correlations of the Japanese production network. We consider the supplier-customer network, which is a directed network representing the trading links between Japanese firms (links from suppliers to customers). The community structure of this network is determined by applying the Infomap algorithm. Each community is defined by its GDP and its associated business cycle. Business cycle correlations between communities are estimated based on copula theory. Then, based on firms’ attributes and network topology, these correlations are explained through linear econometric models. The results show strong evidence of business cycle correlations in the Japanese production network. A significant systemic risk is found for high negative or positive shocks. These correlations are explained mainly by the sector and by geographic similarities. Moreover, our results highlight the higher vulnerability of small communities and small firms, which is explained by the disassortative mixing of the production network. PMID:29059233
Global effects of local food-production crises: a virtual water perspective
Tamea, Stefania; Laio, Francesco; Ridolfi, Luca
2016-01-01
By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008–09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability. PMID:26804492
Global effects of local food-production crises: a virtual water perspective.
Tamea, Stefania; Laio, Francesco; Ridolfi, Luca
2016-01-25
By importing food and agricultural goods, countries cope with the heterogeneous global water distribution and often rely on water resources available abroad. The virtual displacement of the water used to produce such goods (known as virtual water) connects together, in a global water system, all countries participating to the international trade network. Local food-production crises, having social, economic or environmental origin, propagate in this network, modifying the virtual water trade and perturbing local and global food availability, quantified in terms of virtual water. We analyze here the possible effects of local crises by developing a new propagation model, parsimonious but grounded on data-based and statistically-verified assumptions, whose effectiveness is proved on the Argentinean crisis in 2008-09. The model serves as the basis to propose indicators of crisis impact and country vulnerability to external food-production crises, which highlight that countries with largest water resources have the highest impact on the international trade, and that not only water-scarce but also wealthy and globalized countries are among the most vulnerable to external crises. The temporal analysis reveals that global average vulnerability has increased over time and that stronger effects of crises are now found in countries with low food (and water) availability.