Sample records for power analysis attacks

  1. Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals

    NASA Astrophysics Data System (ADS)

    Lee, You-Seok; Lee, Young-Jun; Han, Dong-Guk; Kim, Ho-Won; Kim, Hyoung-Nam

    A power analysis attack is a well-known side-channel attack but the efficiency of the attack is frequently degraded by the existence of power components, irrelative to the encryption included in signals used for the attack. To enhance the performance of the power analysis attack, we propose a preprocessing method based on extracting encryption-related parts from the measured power signals. Experimental results show that the attacks with the preprocessed signals detect correct keys with much fewer signals, compared to the conventional power analysis attacks.

  2. Simulation of Attacks for Security in Wireless Sensor Network.

    PubMed

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  3. Simulation of Attacks for Security in Wireless Sensor Network

    PubMed Central

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  4. Predicting Factors of Zone 4 Attack in Volleyball.

    PubMed

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  5. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork.

  6. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    NASA Astrophysics Data System (ADS)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  7. Counteracting Power Analysis Attacks by Masking

    NASA Astrophysics Data System (ADS)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  8. Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks

    PubMed Central

    Feng, Jingyu; Zhang, Man; Xiao, Yun; Yue, Hongzhou

    2018-01-01

    Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce spectrum resources. However, if CSS assumes that all secondary users (SU) are honest, it may offer opportunities for attackers to conduct a spectrum sensing data falsification (SSDF) attack. To suppress such a threat, recent efforts have been made to develop trust mechanisms. Currently, some attackers can collude with each other to form a collusive clique, and thus not only increase the power of SSDF attack but also avoid the detection of a trust mechanism. Noting the duality of sensing data, we propose a defense scheme called XDA from the perspective of XOR distance analysis to suppress a collusive SSDF attack. In the XDA scheme, the XOR distance calculation in line with the type of “0” and “1” historical sensing data is used to measure the similarity between any two SUs. Noting that collusive SSDF attackers hold high trust value and the minimum XOR distance, the algorithm to detect collusive SSDF attackers is designed. Meanwhile, the XDA scheme can perfect the trust mechanism to correct collusive SSDF attackers’ trust value. Simulation results show that the XDA scheme can enhance the accuracy of trust evaluation, and thus successfully reduce the power of collusive SSDF attack against CSS. PMID:29382061

  9. Network topology and resilience analysis of South Korean power grid

    NASA Astrophysics Data System (ADS)

    Kim, Dong Hwan; Eisenberg, Daniel A.; Chun, Yeong Han; Park, Jeryang

    2017-01-01

    In this work, we present topological and resilience analyses of the South Korean power grid (KPG) with a broad voltage level. While topological analysis of KPG only with high-voltage infrastructure shows an exponential degree distribution, providing another empirical evidence of power grid topology, the inclusion of low voltage components generates a distribution with a larger variance and a smaller average degree. This result suggests that the topology of a power grid may converge to a highly skewed degree distribution if more low-voltage data is considered. Moreover, when compared to ER random and BA scale-free networks, the KPG has a lower efficiency and a higher clustering coefficient, implying that highly clustered structure does not necessarily guarantee a functional efficiency of a network. Error and attack tolerance analysis, evaluated with efficiency, indicate that the KPG is more vulnerable to random or degree-based attacks than betweenness-based intentional attack. Cascading failure analysis with recovery mechanism demonstrates that resilience of the network depends on both tolerance capacity and recovery initiation time. Also, when the two factors are fixed, the KPG is most vulnerable among the three networks. Based on our analysis, we propose that the topology of power grids should be designed so the loads are homogeneously distributed, or functional hubs and their neighbors have high tolerance capacity to enhance resilience.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Almajali, Anas; Rice, Eric; Viswanathan, Arun

    This paper presents a systems analysis approach to characterizing the risk of a Smart Grid to a load-drop attack. A characterization of the risk is necessary for the design of detection and remediation strategies to address the consequences of such attacks. Using concepts from systems health management and system engineering, this work (a) first identifies metrics that can be used to generate constraints for security features, and (b) lays out an end-to-end integrated methodology using separate network and power simulations to assess system risk. We demonstrate our approach by performing a systems-style analysis of a load-drop attack implemented over themore » AMI subsystem and targeted at destabilizing the underlying power grid.« less

  11. Novel Method For Low-Rate Ddos Attack Detection

    NASA Astrophysics Data System (ADS)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  12. Research on high power intra-channel crosstalk attack in optical networks

    NASA Astrophysics Data System (ADS)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  13. A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Gunasekaran, Mahalakshmi; Periakaruppan, Subathra

    2017-06-01

    Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.

  14. Business Case Analysis Of Small Modular Reactors (SMR) For DOD Assured Power

    DTIC Science & Technology

    2017-12-01

    Smith Second Reader: Thomas L. Albright THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public...SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89...attack (EMP) represents one of the most devastating forms of attack on the power grid. Because the North American grid is made up of three major

  15. Quantifying Improbability: An Analysis of the Lloyd’s of London Business Blackout Cyber Attack Scenario

    DTIC Science & Technology

    Scenarios that describe cyber attacks on the electric grid consistently predict significant disruptions to the economy and citizens quality of life...phenomena that deserve further investigation, such as the importance of some individual power plants in influencing the adversarys probability of

  16. Security attack detection algorithm for electric power gis system based on mobile application

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  17. Cybersecurity for distributed energy resources and smart inverters

    DOE PAGES

    Qi, Junjian; Hahn, Adam; Lu, Xiaonan; ...

    2016-12-01

    The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less

  18. Cybersecurity for distributed energy resources and smart inverters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Qi, Junjian; Hahn, Adam; Lu, Xiaonan

    The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber attacks. This paper proposes a holistic attack-resilient framework to protect the the integrated DER and the critical power grid infrastructure from malicious cyber attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, we discuss the architecture of the cyber-physical power system with a high penetration of DER and analyze themore » unique cybersecurity challenges introduced by DER integration. Next, we summarize important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Lastly, we introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.« less

  19. Construction of a Cyber Attack Model for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missedmore » if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.« less

  20. Identification and Ranking of Critical Assets within an Electrical Grid under Threat of Cyber Attack

    NASA Astrophysics Data System (ADS)

    Boyer, Blake R.

    This paper examines the ranking of critical assets within an electrical grid under threat of cyber attack.1 Critical to this analysis is the assumption of zero hour exploits namely, the threat of an immediate attack as soon as a vulnerability is discovered. Modeling shows that over time load fluctuations as well as other system variations will change the importance of each asset in the delivery of bulk power. As opposed to classic stability studies where risk can be shown to be greatest during high load periods, the zero hour exploit-cyber-risk assumes that vulnerabilities will be attacked as soon as they are discovered. The probability of attacks is made uniform over time to include any and all possible attacks. Examining the impact of an attack and how the grid reacts immediately following an attack will identify and determine the criticality of each asset. This work endeavors to fulfill the NERC Critical Infrastructure Protection Requirements CIP-001-1 through CIP-009-2, cyber security requirements for the reliable supply of bulk power to customers throughout North America. 1Critical assets will here refer to facilities, systems, and equipment, which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System, NERC Glossary of Terms Used in Reliability Standards, 2009

  1. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    PubMed

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  2. Nonlinear analysis of NPP safety against the aircraft attack

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk; Králik, Juraj, E-mail: kralik@fa.stuba.sk

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  3. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  4. Is stress a trigger factor for migraine?

    PubMed

    Schoonman, G G; Evers, D J; Ballieux, B E; de Geus, E J; de Kloet, E R; Terwindt, G M; van Dijk, J G; Ferrari, M D

    2007-06-01

    Although mental stress is commonly considered to be an important trigger factor for migraine, experimental evidence for this belief is yet lacking. To study the temporal relationship between changes in stress-related parameters (both subjective and objective) and the onset of a migraine attack. This was a prospective, ambulatory study in 17 migraine patients. We assessed changes in perceived stress and objective biological measures for stress (saliva cortisol, heart rate average [HRA], and heart rate variability [low-frequency power and high-frequency power]) over 4 days prior to the onset of spontaneous migraine attacks. Analyses were repeated for subgroups of patients according to whether or not they felt their migraine to be triggered by stress. There were no significant temporal changes over time for the whole group in perceived stress (p=0.50), morning cortisol (p=0.73), evening cortisol (p=0.55), HRA (p=0.83), low-frequency power (p=0.99) and high-frequency power (p=0.97) prior to or during an attack. Post hoc analysis of the subgroup of nine stress-sensitive patients who felt that >2/3 of their migraine attacks were triggered by psychosocial stress, revealed an increase for perceived stress (p=0.04) but no changes in objective stress response measures. At baseline, this group also showed higher scores on the Penn State Worry Questionnaire (p=0.003) and the Cohen Perceived Stress Scale (p=0.001) compared to non-stress-sensitive patients. Although stress-sensitive patients, in contrast to non-stress-sensitive patients, may perceive more stress in the days before an impending migraine attack, we failed to detect any objective evidence for a biological stress response before or during migraine attacks.

  5. A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks

    PubMed Central

    Cao, Yuan; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang

    2018-01-01

    Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μm2 and consumes a power as low as 5.16 μW per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of −40∼120 ∘C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications. PMID:29360790

  6. A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks.

    PubMed

    Cao, Yuan; Zhao, Xiaojin; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang

    2018-01-23

    Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μ m 2 and consumes a power as low as 5.16 μ W per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of -40∼120 ∘ C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications.

  7. Does topological information matter for power grid vulnerability?

    PubMed

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  8. Does topological information matter for power grid vulnerability?

    NASA Astrophysics Data System (ADS)

    Ouyang, Min; Yang, Kun

    2014-12-01

    Power grids, which are playing an important role in supporting the economy of a region as well as the life of its citizens, could be attacked by terrorists or enemies to damage the region. Depending on different levels of power grid information collected by the terrorists, their attack strategies might be different. This paper groups power grid information into four levels: no information, purely topological information (PTI), topological information with generator and load nodes (GLNI), and full information (including component physical properties and flow parameters information), and then identifies possible attack strategies for each information level. Analyzing and comparing power grid vulnerability under these attack strategies from both terrorists' and utility companies' point of view give rise to an approach to quantify the relative values of these three types of information, including PTI, GLNI, and component parameter information (CPI). This approach can provide information regarding the extent to which topological information matters for power system vulnerability decisions. Taking several test systems as examples, results show that for small attacks with p ≤ 0.1, CPI matters the most; when taking attack cost into consideration and assuming that the terrorists take the optimum cost-efficient attack intensity, then CPI has the largest cost-based information value.

  9. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Eilyan Bitar; Miles McQueen

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacksmore » [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.« less

  10. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  11. Metrics for Assessment of Smart Grid Data Integrity Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Annarita Giani; Miles McQueen; Russell Bent

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less

  12. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  13. Finite Energy and Bounded Attacks on Control System Sensor Signals

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less

  14. Shall we trust WDDL?

    NASA Astrophysics Data System (ADS)

    Guilley, Sylvain; Chaudhuri, Sumanta; Sauvage, Laurent; Graba, Tarik; Danger, Jean-Luc; Hoogvorst, Philippe; Vong, Vinh-Nga; Nassar, Maxime; Flament, Florent

    Security is not only a matter of cryptographic algorithms robustness but becomes also a question of securing their implementation. P. Kocher’s differential power analysis (DPA) is one of the many side-channel attacks that are more and more studied by the security community. Indeed, side-channel attacks (SCA) have proved to be very powerful on cryptographic algorithms such as DES and AES, customarily implemented in a wide variety of devices, ranging from smart-cards or ASICs to FPGAs. Among the proposed countermeasures, the “dual-rail with precharge logic” (DPL) aims at hiding information leaked by the circuit by making the power consumption independent of the calculation. However DPL logic could be subject to second order attacks exploiting timing difference between dual nets. In this article, we characterize by simulation, the vulnerability due to timing unbalance in the eight DES substitution boxes implemented in DPL WDDL style. The characterization results in a classification of the nodes according to their timing unbalance. Our results show that the timing unbalance is a major weakness of the WDDL logic, and that it could be used to retrieve the key using a DPA attack. This vulnerability has been experimentally observed on a full DES implementation using WDDL style for Altera Stratix EP1S25 FPGA.

  15. Terrorism Risk Modeling for Intelligence Analysis and Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    comparatively high risk of CBRN attacks. Estimates of sabotage risk are highly dependent on proximity of nuclear power plants , chemical plants , or oil...and casinos, airports, nuclear power plants 3 Military, train and subway stations, stadiums, bridges and tunnels 4 Industrial facilities, oil and...airspace zones 8 Power plants , dams, railway networks levels. Collecting and incorporating such data for specific localities or industry sectors would

  16. SCA security verification on wireless sensor network node

    NASA Astrophysics Data System (ADS)

    He, Wei; Pizarro, Carlos; de la Torre, Eduardo; Portilla, Jorge; Riesgo, Teresa

    2011-05-01

    Side Channel Attack (SCA) differs from traditional mathematic attacks. It gets around of the exhaustive mathematic calculation and precisely pin to certain points in the cryptographic algorithm to reveal confidential information from the running crypto-devices. Since the introduction of SCA by Paul Kocher et al [1], it has been considered to be one of the most critical threats to the resource restricted but security demanding applications, such as wireless sensor networks. In this paper, we focus our work on the SCA-concerned security verification on WSN (wireless sensor network). A detailed setup of the platform and an analysis of the results of DPA (power attack) and EMA (electromagnetic attack) is presented. The setup follows the way of low-cost setup to make effective SCAs. Meanwhile, surveying the weaknesses of WSNs in resisting SCA attacks, especially for the EM attack. Finally, SCA-Prevention suggestions based on Differential Security Strategy for the FPGA hardware implementation in WSN will be given, helping to get an improved compromise between security and cost.

  17. Topological robustness analysis of protein interaction networks reveals key targets for overcoming chemotherapy resistance in glioma

    NASA Astrophysics Data System (ADS)

    Azevedo, Hátylas; Moreira-Filho, Carlos Alberto

    2015-11-01

    Biological networks display high robustness against random failures but are vulnerable to targeted attacks on central nodes. Thus, network topology analysis represents a powerful tool for investigating network susceptibility against targeted node removal. Here, we built protein interaction networks associated with chemoresistance to temozolomide, an alkylating agent used in glioma therapy, and analyzed their modular structure and robustness against intentional attack. These networks showed functional modules related to DNA repair, immunity, apoptosis, cell stress, proliferation and migration. Subsequently, network vulnerability was assessed by means of centrality-based attacks based on the removal of node fractions in descending orders of degree, betweenness, or the product of degree and betweenness. This analysis revealed that removing nodes with high degree and high betweenness was more effective in altering networks’ robustness parameters, suggesting that their corresponding proteins may be particularly relevant to target temozolomide resistance. In silico data was used for validation and confirmed that central nodes are more relevant for altering proliferation rates in temozolomide-resistant glioma cell lines and for predicting survival in glioma patients. Altogether, these results demonstrate how the analysis of network vulnerability to topological attack facilitates target prioritization for overcoming cancer chemoresistance.

  18. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less

  19. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    PubMed

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  20. Rebuilding the Joint Airborne Forward Air Controller: Analyzing Joint Air Tasking Doctrine’s Ability to Facilitate Effective Air-Ground Integration

    DTIC Science & Technology

    2013-12-13

    Air Controller: An Analysis of Mosquito Operations in Korea Since the dawn of powered flight, airpower visionaries and land warfare stalwarts have...properly employed, this aid from the sky in assisting during an attack by our own troops or in repelling an attack or counterattack by the enemy greatly...proliferation of airborne Forward Air Controllers. The Mosquito Airborne Tactical Air Coordinator (TAC(A)) role, known as FAC(A) in modern joint

  1. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui

    Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less

  2. Heat transfer and oil flow studies on a single-stage-to-orbit control-configured winged entry vehicle

    NASA Technical Reports Server (NTRS)

    Helms, V. T., III; Bradley, P. F.

    1984-01-01

    Results are presented for oil flow and phase change paint heat transfer tests conducted on a 0.006 scale model of a proposed single stage to orbit control configured vehicle. The data were taken at angles of attack up to 40 deg at a free stream Mach number of 10 for Reynolds numbers based on model length of 0.5 x 10 to the 6th power, 1.0 x 10 to the 6th power and 2.0 x 10 to the 6th power. The magnitude and distribution of heating are characterized in terms of angle of attack and Reynolds number aided by an analysis of the flow data which are used to suggest the presence of various three dimensional flow structures that produce the observed heating patterns. Of particular interest are streak heating patterns that result in high localized heat transfer rates on the wing windward surface at low to moderate angles of attack. These streaks are caused by the bow-shock/wing-shock interaction and formation of the wing-shock. Embedded vorticity was found to be associated with these interactions.

  3. Deep Learning-Based Data Forgery Detection in Automatic Generation Control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhang, Fengli; Li, Qinghua

    Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to do false generation correction which will harm the power grid operation. Such attacks are hard to be detected since they do not violate physical power system models. In this work, we propose algorithms based on Neural Networkmore » and Fourier Transform to detect data forgery attacks in AGC. Different from the few previous work that rely on accurate load prediction to detect data forgery, our solution only uses the ACE data already available in existing AGC systems. In particular, our solution learns the normal patterns of ACE time series and detects abnormal patterns caused by artificial attacks. Evaluations on the real ACE dataset show that our methods have high detection accuracy.« less

  4. Numerical investigation on the performance of fin and tube heat exchangers using rectangular vortex generators

    NASA Astrophysics Data System (ADS)

    Zeeshan, Mohd; Hazarika, Saheera Azmi; Nath, Sujit; Bhanja, Dipankar

    2017-07-01

    In the present work, a 3-D numerical investigation has been performed to explore the effect of attack angles on the thermal-hydraulic performance of fin and tube heat exchanger (FTHE) using rectangular winglet pairs (RWPs). RWPs are placed adjacent to the tubes and three attack angels are considered for the study i.e. 5°, 15° and 25°. The effect of attack angles are examined on the heat transfer characteristics as well as in pressure drop penalty with airside Reynolds number Rea ranges from 500 to 900. Two performance evaluation criteria namely PEC1 i.e. area goodness factor (j/f) and PEC2 i.e. heat transfer rate per unit fan power consumption (Q/Pf) are considered for the performance evaluation. Furthermore, MOORA method is applied to obtain the performance order of FTHE configurations by taking PEC1 and PEC2 as beneficial attributes and fan power Pf as a non-beneficial attribute, keeping equal importance to each attribute. The results show that 5° attack angle provides the better performance in terms of PEC1 as heat transfer coefficient is increased by 27.70% at Rea=500 and 32.73% at Rea=900 respectively with 13.01% increased pressure drop penalty at Rea=500 and 14.26% at Rea=900 respectively. In terms of PEC2, though the 5° attack angle provides the high values of Q/Pf factor among the 15° and 25° attack angles, but it is found insignificant to replace the baseline configuration i.e. plain fin and tube heat exchanger configuration without vortex generators. Moreover, in MOORA optimization analysis also, it is found that 5° attack angle provides the better thermal-hydraulic performance.

  5. Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Niederberger, Armand; Scarani, Valerio; Gisin, Nicolas

    2005-04-01

    In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Luetkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2{yields}3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2{yields}3more » cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2{yields}3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.« less

  6. Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.

    PubMed

    Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B

    2018-04-30

    We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.

  7. A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mousavian, Seyedamirabbas; Valenzuela, Jorge; Wang, Jianhui

    The power grid is becoming more dependent on information and communication technologies. Complex networks of advanced sensors such as phasor measurement units (PMUs) are used to collect real time data to improve the observability of the power system. Recent studies have shown that the power grid has significant cyber vulnerabilities which could increase when PMUs are used extensively. Therefore, recognizing and responding to vulnerabilities are critical to the security of the power grid. This paper proposes a risk mitigation model for optimal response to cyber-attacks to PMU networks. We model the optimal response action as a mixed integer linear programmingmore » (MILP) problem to prevent propagation of the cyber-attacks and maintain the observability of the power system.« less

  8. Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution.

    PubMed

    García-Patrón, Raúl; Cerf, Nicolas J

    2006-11-10

    A fully general approach to the security analysis of continuous-variable quantum key distribution (CV-QKD) is presented. Provided that the quantum channel is estimated via the covariance matrix of the quadratures, Gaussian attacks are shown to be optimal against all collective eavesdropping strategies. The proof is made strikingly simple by combining a physical model of measurement, an entanglement-based description of CV-QKD, and a recent powerful result on the extremality of Gaussian states [M. M. Wolf, Phys. Rev. Lett. 96, 080502 (2006)10.1103/PhysRevLett.96.080502].

  9. Rays as weapons.

    PubMed

    Vogel, H

    2007-08-01

    Ionizing radiation is being regarded as life threatening. Therefore, accidents in nuclear power plants are considered equal threatening as nuclear bomb explosions, and attacks with dirty bombs are thought as dangerous as nuclear weapon explosions. However, there are differences between a nuclear bomb explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. It is intended to point them out. The processes are described, which damage in a nuclear bomb explosion, in the largest imaginable accident in a nuclear power plant, and in an attack with a dirty bomb. Their effects are compared with each other, i.e. explosion, heat, shock wave (blast), ionizing radiation, and fallout. In the center of the explosion of a nuclear bomb, the temperature rises to 100Mio degrees C, this induces damaging heat radiation and shock wave. In the largest imaginable accident in a nuclear power plant and in the conventional explosion of a dirty bomb, the temperature may rise up to 3000 degrees C, heat radiation and blast are limited to a short distance. In nuclear power plants, explosions due to oxyhydrogen gas or steam may occur. In nuclear explosions the dispersed radioactive material (fall out) consists mainly of isotopes with short half-life, in nuclear power plants and in dirty bomb attacks with longer half-life. The amount of fall out is comparable in nuclear bomb explosions with that in the largest imaginable accident in a nuclear power plant, it is smaller in attacks with dirty bombs. An explosion in a nuclear power plant even in the largest imaginable accident is not a nuclear explosion. In Hiroshima and Nagasaki, there were 200,000 victims nearly all by heat and blast, some 300 died by ionizing radiation. In Chernobyl, there have been less than 100 victims due to ionizing radiation up till now. A dirty bomb kills possibly with the explosion of conventional explosive, the dispersed radioactive material may damage individuals. The incorporation of irradiating substances may kill and be difficult to detect (Litvinenko). A new form of (government supported) terrorism/crime appears possible. The differences are important between a nuclear weapon explosion, the largest imaginable accident in a nuclear power plant, and an attack with a dirty bomb. Nuclear weapons kill by heat and blast; in the largest imaginable accident in a nuclear power plant, they are less strong and limited to the plant; an attack with a dirty bomb is as life threatening as an ("ordinary") bomb attack, dispersed radiating material may be a risk for individuals.

  10. Cyber Power: Attack and Defense Lessons from Land, Sea, and Air Power

    DTIC Science & Technology

    2011-06-01

    over defense for a long time to come. The logical conclusion is that effective electronic and cyber defense are impossible. However, in...air attack with sufficient accuracy and warning time to mount an effective defense. 3 The 1...considering the suddenness of the attack, it is unlikely that the enemy would have time enough to parry the blow effectively either in the air or from the

  11. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glenn, Colleen; Sterbentz, Dane; Wright, Aaron

    With utilities in the U.S. and around the world increasingly moving toward smart grid technology and other upgrades with inherent cyber vulnerabilities, correlative threats from malicious cyber attacks on the North American electric grid continue to grow in frequency and sophistication. The potential for malicious actors to access and adversely affect physical electricity assets of U.S. electricity generation, transmission, or distribution systems via cyber means is a primary concern for utilities contributing to the bulk electric system. This paper seeks to illustrate the current cyber-physical landscape of the U.S. electric sector in the context of its vulnerabilities to cyber attacks,more » the likelihood of cyber attacks, and the impacts cyber events and threat actors can achieve on the power grid. In addition, this paper highlights utility perspectives, perceived challenges, and requests for assistance in addressing cyber threats to the electric sector. There have been no reported targeted cyber attacks carried out against utilities in the U.S. that have resulted in permanent or long term damage to power system operations thus far, yet electric utilities throughout the U.S. have seen a steady rise in cyber and physical security related events that continue to raise concern. Asset owners and operators understand that the effects of a coordinated cyber and physical attack on a utility’s operations would threaten electric system reliability–and potentially result in large scale power outages. Utilities are routinely faced with new challenges for dealing with these cyber threats to the grid and consequently maintain a set of best practices to keep systems secure and up to date. Among the greatest challenges is a lack of knowledge or strategy to mitigate new risks that emerge as a result of an exponential rise in complexity of modern control systems. This paper compiles an open-source analysis of cyber threats and risks to the electric grid, utility best practices for prevention and response to cyber threats, and utility suggestions about how the federal government can aid utilities in combating and mitigating risks.« less

  12. Identification of Successive ``Unobservable'' Cyber Data Attacks in Power Systems Through Matrix Decomposition

    NASA Astrophysics Data System (ADS)

    Gao, Pengzhi; Wang, Meng; Chow, Joe H.; Ghiocel, Scott G.; Fardanesh, Bruce; Stefopoulos, George; Razanousky, Michael P.

    2016-11-01

    This paper presents a new framework of identifying a series of cyber data attacks on power system synchrophasor measurements. We focus on detecting "unobservable" cyber data attacks that cannot be detected by any existing method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the identification problem of successive unobservable cyber attacks as a matrix decomposition problem of a low-rank matrix plus a transformed column-sparse matrix. We propose a convex-optimization-based method and provide its theoretical guarantee in the data identification. Numerical experiments on actual PMU data from the Central New York power system and synthetic data are conducted to verify the effectiveness of the proposed method.

  13. Combat Power Analysis is Combat Power Density

    DTIC Science & Technology

    2012-05-17

    Fires battalion of 16x - Partisan employment of lEOs determine the outcome of any engagement 155mm - 81mm and 60mm Mortars where collateral damage...Cutting the enemy LOC to support their - 4x Forward support - Relatively light sustainment conventional forces will be relatively ineffective so...Neutralization of the partisan company as well Weakness: Weakness: as attacking the LOCs will isolate the enemy. Logistical assets require roads - LOCs

  14. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  15. Differential Power Analysis as a digital forensic tool.

    PubMed

    Souvignet, T; Frinken, J

    2013-07-10

    Electronic payment fraud is considered a serious international crime by Europol. An important part of this fraud comes from payment card data skimming. This type of fraud consists of an illegal acquisition of payment card details when a user is withdrawing cash at an automated teller machine (ATM) or paying at a point of sale (POS). Modern skimming devices, also known as skimmers, use secure crypto-algorithms (e.g. Advanced Encryption Standard (AES)) to protect skimmed data stored within their memory. In order to provide digital evidence in criminal cases involving skimmers, law enforcement agencies (LEAs) must retrieve the plaintext skimmed data, generally without having knowledge of the secret key. This article proposes an alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key. The proposed solution is non-invasive, based on Power Analysis Attack (PAA). This article first describes the structure and the behaviour of an AES skimmer, followed by the proposal of the full operational PAA process, from power measurements to attack computation. Finally, it presents results obtained in several cases, explaining the latest improvements and providing some ideas for further developments. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. Robustness of Controllability for Networks Based on Edge-Attack

    PubMed Central

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components. PMID:24586507

  17. Robustness of controllability for networks based on edge-attack.

    PubMed

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.

  18. Ultra high bypass Nacelle aerodynamics inlet flow-through high angle of attack distortion test

    NASA Technical Reports Server (NTRS)

    Larkin, Michael J.; Schweiger, Paul S.

    1992-01-01

    A flow-through inlet test program was conducted to evaluate inlet test methods and determine the impact of the fan on inlet separation when operating at large angles of attack. A total of 16 model configurations of approximately 1/6 scale were tested. A comparison of these flow-through results with powered data indicates the presence of the fan increased separation operation 3 degrees to 4 degrees over the flow through inlet. Rods and screens located at the fan face station, that redistribute the flow, achieved simulation of the powered-fan results for separation angle of attack. Concepts to reduce inlet distortion and increase angle of attack capability were also evaluated. Vortex generators located on the inlet surface increased inlet angle of attack capability up to 2 degrees and reduced inlet distortion in the separated region. Finally, a method of simulating the fan/inlet aerodynamic interaction using blockage sizing method has been defined. With this method, a static blockage device used with a flow-through model will approximate the same inlet onset of separation angle of attack and distortion pattern that would be obtained with an inlet model containing a powered fan.

  19. Study of aerodynamic technology for single-cruise engine V/STOL fighter/attack aircraft

    NASA Technical Reports Server (NTRS)

    Driggers, H. H.; Powers, S. A.; Roush, R. T.

    1982-01-01

    A conceptual design analysis is performed on a single engine V/STOL supersonic fighter/attack concept powered by a series flow tandem fan propulsion system. Forward and aft mounted fans have independent flow paths for V/STOL operation and series flow in high speed flight. Mission, combat and V/STOL performance is calculated. Detailed aerodynamic estimates are made and aerodynamic uncertainties associated with the configuration and estimation methods identified. A wind tunnel research program is developed to resolve principal uncertainties and establish a data base for the baseline configuration and parametric variations.

  20. Future's operation areas: new-generation suppression enemy air defence (SEAD) elements

    NASA Astrophysics Data System (ADS)

    Hazinedar, Ä.°lker

    2015-05-01

    Since air vehicles took place in the theater of operations, they have become the indispensable elements and the strongest attack power of armed forces. In the following period, with technological development, supersonic aircrafts took place in the operation area and this increased effectiveness of air vehicles much more. Air forces have used these aircrafts during important missions like strategic attack and air defense operations. On the other hand, decision makers understood that it was not feasible to intercept fighter aircrafts by executing combat air patrol flight missions. Since there is not enough reaction time to intercept the high speed aircrafts, ground stationed Surface to Air Missiles (SAM) system requirement has emerged. Therefore, SAM systems took place in the operation scene as well. Due to the fact that SAM systems emerged against the attack power, the attack aircrafts are to keep away from the fire of the ground stationed SAM systems. Hence, the requirement of Suppression Enemy Air Defense (SEAD) arose. SEAD elements take under suppression the radar of the SAM systems. In this way, attack aircrafts are able to attack without the risk of SAM systems. The purpose of this study is to find new methods or concepts in order to protect friendly attack aircrafts against ground based surface to air missiles' fires. Modernization of SAM systems and new generation SAM system producing activities have proceeded with positive acceleration. So, current SEAD elements and concepts are not able to cover the requirements due to the increased SAM system ranges. According to the concepts, SEAD weapons` ranges must be longer than the SAM weapons' ranges to protect friendly aircrafts. In this study, new concept was offered to overcome the deficiencies of current SEAD concept. The elements of new concepts were put forward. Classic SEAD concept and new generation concepts were assessed by using SWOT analysis technique. As a result, this study has revealed that, air forces' effectiveness can be enhanced by using new generation SEAD concepts against enemy SAM systems.

  1. Defeating Insider Attacks via Autonomic Self-Protective Networks

    ERIC Educational Resources Information Center

    Sibai, Faisal M.

    2012-01-01

    There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…

  2. Improved statistical analysis of moclobemide dose effects on panic disorder treatment.

    PubMed

    Ross, Donald C; Klein, Donald F; Uhlenhuth, E H

    2010-04-01

    Clinical trials with several measurement occasions are frequently analyzed using only the last available observation as the dependent variable [last observation carried forward (LOCF)]. This ignores intermediate observations. We reanalyze, with complete data methods, a clinical trial previously reported using LOCF, comparing placebo and five dosage levels of moclobemide in the treatment of outpatients with panic disorder to illustrate the superiority of methods using repeated observations. We initially analyzed unprovoked and situational, major and minor attacks as the four dependent variables, by repeated measures maximum likelihood methods. The model included parameters for linear and curvilinear time trends and regression of measures during treatment on baseline measures. Significance tests using this method take into account the structure of the error covariance matrix. This makes the sphericity assumption irrelevant. Missingness is assumed to be unrelated to eventual outcome and the residuals are assumed to have a multivariate normal distribution. No differential treatment effects for limited attacks were found. Since similar results were obtained for both types of major attack, data for the two types of major attack were combined. Overall downward linear and negatively accelerated downward curvilinear time trends were found. There were highly significant treatment differences in the regression slopes of scores during treatment on baseline observations. For major attacks, all treatment groups improved over time. The flatter regression slopes, obtained with higher doses, indicated that higher doses result in uniformly lower attack rates regardless of initial severity. Lower doses do not lower the attack rate of severely ill patients to those achieved in the less severely ill. The clinical implication is that more severe patients require higher doses to attain best benefit. Further, the significance levels obtained by LOCF analyses were only in the 0.05-0.01 range, while significance levels of <0.00001 were obtained by these repeated measures analyses indicating increased power. The greater sensitivity to treatment effect of this complete data method is illustrated. To increase power, it is often recommended to increase sample size. However, this is often impractical since a major proportion of the cost per subject is due to the initial evaluation. Increasing the number of repeated observations increases power economically and also allows detailed longitudinal trajectory analyses.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as amore » means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.« less

  4. A Method of Synchrophasor Technology for Detecting and Analyzing Cyber-Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCann, Roy; Al-Sarray, Muthanna

    Studying cybersecurity events and analyzing their impacts encourage planners and operators to develop innovative approaches for preventing attacks in order to avoid outages and other disruptions. This work considers two parts in security studies; detecting an integrity attack and examining its effects on power system generators. The detection was conducted through employing synchrophasor technology to provide authentication of ACG commands based on observed system operating characteristics. The examination of an attack is completed via a detailed simulation of a modified IEEE 68-bus benchmark model to show the associated power system dynamic response. The results of the simulation are discussed formore » assessing the impacts of cyber threats.« less

  5. A comparison of take-off dynamics during three different spikes, block and counter-movement jump in female volleyball players.

    PubMed

    Kabacinski, Jaroslae; Dworak, Lecholslaw B; Murawa, Michal; Ostarello, John; Rzepnicka, Agata; Maczynski, Jacek

    2016-12-01

    The purpose of the study was to compare the take-off dynamics in counter-movement jump (CMJ), volleyball block and spikes. Twelve professional female players, representing the highest volleyball league in Poland, participated in the laboratory tests. A force platform was used to record ground reaction force (GRF) during take-off phase in CMJ test, block from a run-up and spikes: front row attack, slide attack, back row attack. Vertical (v) GRF (peak: Rmax and integral mean: ), impulse of vGRF (J) and mechanical power (peak: Pmax and integral mean:

    ) were analyzed. Significant differences (P<0.05) of values of the dynamic parameters (Rmax, , J, Pmax, and

    ) were found between CMJ, block from a run-up and three different technique spikes. The highest values were recorded during take-off in the back row attack: peak vGRF (2.93±0.05 BW), integral mean vGRF (1.90±0.08 BW), impulse of vGRF (354±40 Ns), peak power (5320±918 W) and integral mean power (3604±683 W). Peak power (2608±217 W) and integral mean power (1417±94 W) were determined in CMJ test to evaluate the force-velocity capabilities of the players. In terms of GRF and the mechanical power, high level of dynamics in take-off influences positively the jumping height and significantly increases the effectiveness of attacks during spike of the ball over the block of the opponent.

  6. An Analysis of Rapid Technology Transfer Solutions and Best Practices for Use by the Department of Defense

    DTIC Science & Technology

    2010-12-01

    discovered that the NSA is concerned about speaker recognition being vulnerable to man- in-the-middle ( MITM ) attacks. The professional could tailor an MITM ...with the results of the test against the MITM threat. The Collective Acquisition framework comprises powerful search techniques found in the CRC

  7. Identifying Electromagnetic Attacks against Airports

    NASA Astrophysics Data System (ADS)

    Kreth, A.; Genender, E.; Doering, O.; Garbe, H.

    2012-05-01

    This work presents a new and sophisticated approach to detect and locate the origin of electromagnetic attacks. At the example of an airport, a normal electromagnetic environment is defined, in which electromagnetic attacks shall be identified. After a brief consideration of the capabilities of high power electromagnetic sources to produce high field strength values, this contribution finally presents the approach of a sensor network, realizing the identification of electromagnetic attacks.

  8. WeaselBoard :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.

    2013-10-01

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-daymore » exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.« less

  9. Cyber threat impact assessment and analysis for space vehicle architectures

    NASA Astrophysics Data System (ADS)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  10. Transport Traffic Analysis for Abusive Infrastructure Characterization

    DTIC Science & Technology

    2012-12-14

    Introduction Abusive traffic abounds on the Internet, in the form of email, malware, vulnerability scanners, worms, denial-of-service, drive-by-downloads, scam ...insight is two-fold. First, attackers have a basic requirement to source large amounts of data, be it denial-of-service, scam -hosting, spam, or other...the network core. This paper explores the power of transport-layer traffic analysis to detect and characterize scam hosting infrastructure, including

  11. Method and apparatus for detecting cyber attacks on an alternating current power grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McEachern, Alexander; Hofmann, Ronald

    A method and apparatus for detecting cyber attacks on remotely-operable elements of an alternating current distribution grid. Two state estimates of the distribution grid are prepared, one of which uses micro-synchrophasors. A difference between the two state estimates indicates a possible cyber attack.

  12. Testbeds for Assessing Critical Scenarios in Power Control Systems

    NASA Astrophysics Data System (ADS)

    Dondossola, Giovanna; Deconinck, Geert; Garrone, Fabrizio; Beitollahi, Hakem

    The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility InfrastructurAL Resilience. The selected scenarios refer to power control systems encompassing information and communication security of SCADA systems for grid teleoperation, impact of attacks on inter-operator communications in power emergency conditions, impact of intentional faults on the secondary and tertiary control in power grids with distributed generators. Two testbeds have been developed for assessing the effect of the attacks and prototyping resilient architectures.

  13. High angle-of-attack aerodynamics of a strake-canard-wing V/STOL fighter configuration

    NASA Technical Reports Server (NTRS)

    Durston, D. A.; Schreiner, J. A.

    1983-01-01

    High angle-of-attack aerodynamic data are analyzed for a strake-canard-wing V/STOL fighter configuration. The configuration represents a twin-engine supersonic V/STOL fighter aircraft which uses four longitudinal thrust-augmenting ejectors to provide vertical lift. The data were obtained in tests of a 9.39 percent scale model of the configuration in the NASA Ames 12-Foot Pressure Wind Tunnel, at a Mach number of 0.2. Trimmed aerodynamic characteristics, longitudinal control power, longitudinal and lateral/directional stability, and effects of alternate strake and canard configurations are analyzed. The configuration could not be trimmed (power-off) above 12 deg angle of attack because of the limited pitch control power and the high degree of longitudinal instability (28 percent) at this Mach number. Aerodynamic center location was found to be controllable by varying strake size and canard location without significantly affecting lift and drag. These configuration variations had relatively little effect on the lateral/directional stability up to 10 deg angle of attack.

  14. Agent Based Study of Surprise Attacks:. Roles of Surveillance, Prompt Reaction and Intelligence

    NASA Astrophysics Data System (ADS)

    Shanahan, Linda; Sen, Surajit

    Defending a confined territory from a surprise attack is seldom possible. We use molecular dynamics and statistical physics inspired agent-based simulations to explore the evolution and outcome of such attacks. The study suggests robust emergent behavior, which emphasizes the importance of accurate surveillance, automated and powerful attack response, building layout, and sheds light on the role of communication restrictions in defending such territories.

  15. Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks

    PubMed Central

    2017-01-01

    Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influence are absolutely indispensable. Range-based techniques especially Received Signal Strength (RSS) is facing severe impact of these attacks. This paper proposes algorithms based on Combination Multiple Frequency Multiple Power Localization (C-MFMPL) and Step Function Multiple Frequency Multiple Power Localization (SF-MFMPL). The algorithms have been tested in the presence of multiple types of jamming attacks including capture and replay, random and constant jammers over a log normal shadow fading propagation model. In order to overcome the impact of random and constant jammers, the proposed method uses two sets of frequencies shared by the implemented anchor nodes to obtain the averaged RSS readings all over the transmitted frequencies successfully. In addition, three stages of filters have been used to cope with the replayed beacons caused by the capture and replay jammers. In this paper the localization performance of the proposed algorithms for the ideal case which is defined by without the existence of the jamming attack are compared with the case of jamming attacks. The main contribution of this paper is to achieve robust localization performance in the presence of multiple jamming attacks under log normal shadow fading environment with a different simulation conditions and scenarios. PMID:28493977

  16. Agent-based simulation for human-induced hazard analysis.

    PubMed

    Bulleit, William M; Drewek, Matthew W

    2011-02-01

    Terrorism could be treated as a hazard for design purposes. For instance, the terrorist hazard could be analyzed in a manner similar to the way that seismic hazard is handled. No matter how terrorism is dealt with in the design of systems, the need for predictions of the frequency and magnitude of the hazard will be required. And, if the human-induced hazard is to be designed for in a manner analogous to natural hazards, then the predictions should be probabilistic in nature. The model described in this article is a prototype model that used agent-based modeling (ABM) to analyze terrorist attacks. The basic approach in this article of using ABM to model human-induced hazards has been preliminarily validated in the sense that the attack magnitudes seem to be power-law distributed and attacks occur mostly in regions where high levels of wealth pass through, such as transit routes and markets. The model developed in this study indicates that ABM is a viable approach to modeling socioeconomic-based infrastructure systems for engineering design to deal with human-induced hazards. © 2010 Society for Risk Analysis.

  17. Functional identification of an aggression locus in the mouse hypothalamus

    PubMed Central

    Lin, Dayu; Boyle, Maureen P.; Dollar, Piotr; Lee, Hyosang; Perona, Pietro; Lein, Ed S.; Anderson, David J.

    2010-01-01

    Electrical stimulation of certain hypothalamic regions in cats and rodents can elicit attack behavior, but the exact location of relevant cells within these regions, their requirement for naturally occurring aggression and their relationship to mating circuits have not been clear. Genetic methods for neural circuit manipulation in mice provide a potentially powerful approach to this problem, but brain stimulation-evoked aggression has never been demonstrated in this species. Here we show that optogenetic, but not electrical, stimulation of neurons in the ventromedial hypothalamus, ventrolateral subdivision (VMHvl) causes male mice to attack both females and inanimate objects, as well as males. Pharmacogenetic silencing of VMHvl reversibly inhibits inter-male aggression. Immediate early gene analysis and single unit recordings from VMHvl during social interactions reveal overlapping but distinct neuronal subpopulations involved in fighting and mating. Neurons activated during attack are inhibited during mating, suggesting a potential neural substrate for competition between these behaviors. PMID:21307935

  18. Functional identification of an aggression locus in the mouse hypothalamus.

    PubMed

    Lin, Dayu; Boyle, Maureen P; Dollar, Piotr; Lee, Hyosang; Lein, E S; Perona, Pietro; Anderson, David J

    2011-02-10

    Electrical stimulation of certain hypothalamic regions in cats and rodents can elicit attack behaviour, but the exact location of relevant cells within these regions, their requirement for naturally occurring aggression and their relationship to mating circuits have not been clear. Genetic methods for neural circuit manipulation in mice provide a potentially powerful approach to this problem, but brain-stimulation-evoked aggression has never been demonstrated in this species. Here we show that optogenetic, but not electrical, stimulation of neurons in the ventromedial hypothalamus, ventrolateral subdivision (VMHvl) causes male mice to attack both females and inanimate objects, as well as males. Pharmacogenetic silencing of VMHvl reversibly inhibits inter-male aggression. Immediate early gene analysis and single unit recordings from VMHvl during social interactions reveal overlapping but distinct neuronal subpopulations involved in fighting and mating. Neurons activated during attack are inhibited during mating, suggesting a potential neural substrate for competition between these opponent social behaviours.

  19. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks

    PubMed Central

    Abdulqader Hussein, Ahmed; Rahman, Tharek A.; Leow, Chee Yen

    2015-01-01

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks. PMID:26690159

  20. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  1. Performance Evaluation of Localization Accuracy for a Log-Normal Shadow Fading Wireless Sensor Network under Physical Barrier Attacks.

    PubMed

    Hussein, Ahmed Abdulqader; Rahman, Tharek A; Leow, Chee Yen

    2015-12-04

    Localization is an apparent aspect of a wireless sensor network, which is the focus of much interesting research. One of the severe conditions that needs to be taken into consideration is localizing a mobile target through a dispersed sensor network in the presence of physical barrier attacks. These attacks confuse the localization process and cause location estimation errors. Range-based methods, like the received signal strength indication (RSSI), face the major influence of this kind of attack. This paper proposes a solution based on a combination of multi-frequency multi-power localization (C-MFMPL) and step function multi-frequency multi-power localization (SF-MFMPL), including the fingerprint matching technique and lateration, to provide a robust and accurate localization technique. In addition, this paper proposes a grid coloring algorithm to detect the signal hole map in the network, which refers to the attack-prone regions, in order to carry out corrective actions. The simulation results show the enhancement and robustness of RSS localization performance in the face of log normal shadow fading effects, besides the presence of physical barrier attacks, through detecting, filtering and eliminating the effect of these attacks.

  2. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-05-03

    This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example themore » class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.« less

  3. A graph-based network-vulnerability analysis system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.; Gaylor, T.

    1998-01-01

    This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the classmore » of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  4. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    NASA Astrophysics Data System (ADS)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  5. A methodology for secure recovery of spacecrafts based on a trusted hardware platform

    NASA Astrophysics Data System (ADS)

    Juliato, Marcio; Gebotys, Catherine

    2017-02-01

    This paper proposes a methodology for the secure recovery of spacecrafts and the recovery of its cryptographic capabilities in emergency scenarios recurring from major unintentional failures and malicious attacks. The proposed approach employs trusted modules to achieve higher reliability and security levels in space missions due to the presence of integrity check capabilities as well as secure recovery mechanisms. Additionally, several recovery protocols are thoroughly discussed and analyzed against a wide variety of attacks. Exhaustive search attacks are shown in a wide variety of contexts and are shown to be infeasible and totally independent of the computational power of attackers. Experimental results have shown that the proposed methodology allows for the fast and secure recovery of spacecrafts, demanding minimum implementation area, power consumption and bandwidth.

  6. The Threat Among Us: Insiders Intensify Aviation Terrorism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krull, Katie E.

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less

  7. What's Next in Complex Networks? Capturing the Concept of Attacking Play in Invasive Team Sports.

    PubMed

    Ramos, João; Lopes, Rui J; Araújo, Duarte

    2018-01-01

    The evolution of performance analysis within sports sciences is tied to technology development and practitioner demands. However, how individual and collective patterns self-organize and interact in invasive team sports remains elusive. Social network analysis has been recently proposed to resolve some aspects of this problem, and has proven successful in capturing collective features resulting from the interactions between team members as well as a powerful communication tool. Despite these advances, some fundamental team sports concepts such as an attacking play have not been properly captured by the more common applications of social network analysis to team sports performance. In this article, we propose a novel approach to team sports performance centered on sport concepts, namely that of an attacking play. Network theory and tools including temporal and bipartite or multilayered networks were used to capture this concept. We put forward eight questions directly related to team performance to discuss how common pitfalls in the use of network tools for capturing sports concepts can be avoided. Some answers are advanced in an attempt to be more precise in the description of team dynamics and to uncover other metrics directly applied to sport concepts, such as the structure and dynamics of attacking plays. Finally, we propose that, at this stage of knowledge, it may be advantageous to build up from fundamental sport concepts toward complex network theory and tools, and not the other way around.

  8. Boundary layer control for airships

    NASA Technical Reports Server (NTRS)

    Pake, F. A.; Pipitone, S. J.

    1975-01-01

    An investigation is summarized of the aerodynamic principle of boundary layer control for nonrigid LTA craft. The project included a wind tunnel test on a BLC body of revolution at zero angle of attack. Theoretical analysis is shown to be in excellent agreement with the test data. Methods are evolved for predicting the boundary layer development on a body of revolution and the suction pumping and propulsive power requirements. These methods are used to predict the performance characteristics of a full-scale airship. The analysis indicates that propulsive power reductions of 15 to 25 percent and endurance improvements of 20 to 40 percent may be realized in employing boundary-layer control to nonrigid airships.

  9. Power reduction and the radial limit of stall delay in revolving wings of different aspect ratio

    PubMed Central

    Kruyt, Jan W.; van Heijst, GertJan F.; Altshuler, Douglas L.; Lentink, David

    2015-01-01

    Airplanes and helicopters use high aspect ratio wings to reduce the power required to fly, but must operate at low angle of attack to prevent flow separation and stall. Animals capable of slow sustained flight, such as hummingbirds, have low aspect ratio wings and flap their wings at high angle of attack without stalling. Instead, they generate an attached vortex along the leading edge of the wing that elevates lift. Previous studies have demonstrated that this vortex and high lift can be reproduced by revolving the animal wing at the same angle of attack. How do flapping and revolving animal wings delay stall and reduce power? It has been hypothesized that stall delay derives from having a short radial distance between the shoulder joint and wing tip, measured in chord lengths. This non-dimensional measure of wing length represents the relative magnitude of inertial forces versus rotational accelerations operating in the boundary layer of revolving and flapping wings. Here we show for a suite of aspect ratios, which represent both animal and aircraft wings, that the attachment of the leading edge vortex on a revolving wing is determined by wing aspect ratio, defined with respect to the centre of revolution. At high angle of attack, the vortex remains attached when the local radius is shorter than four chord lengths and separates outboard on higher aspect ratio wings. This radial stall limit explains why revolving high aspect ratio wings (of helicopters) require less power compared with low aspect ratio wings (of hummingbirds) at low angle of attack and vice versa at high angle of attack. PMID:25788539

  10. Hybrid attacks on model-based social recommender systems

    NASA Astrophysics Data System (ADS)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  11. Computer Network Operations Methodology

    DTIC Science & Technology

    2004-03-01

    means of their computer information systems. Disrupt - This type of attack focuses on disrupting as “attackers might surreptitiously reprogram enemy...by reprogramming the computers that control distribution within the power grid. A disruption attack introduces disorder and inhibits the effective...between commanders. The use of methodologies is widespread and done subconsciously to assist individuals in decision making. The processes that

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar

    Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs.more » Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.« less

  13. Network information attacks on the control systems of power facilities belonging to the critical infrastructure

    NASA Astrophysics Data System (ADS)

    Loginov, E. L.; Raikov, A. N.

    2015-04-01

    The most large-scale accidents occurred as a consequence of network information attacks on the control systems of power facilities belonging to the United States' critical infrastructure are analyzed in the context of possibilities available in modern decision support systems. Trends in the development of technologies for inflicting damage to smart grids are formulated. A volume matrix of parameters characterizing attacks on facilities is constructed. A model describing the performance of a critical infrastructure's control system after an attack is developed. The recently adopted measures and legislation acts aimed at achieving more efficient protection of critical infrastructure are considered. Approaches to cognitive modeling and networked expertise of intricate situations for supporting the decision-making process, and to setting up a system of indicators for anticipatory monitoring of critical infrastructure are proposed.

  14. Inertia may limit efficiency of slow flapping flight, but mayflies show a strategy for reducing the power requirements of loiter.

    PubMed

    Usherwood, James R

    2009-03-01

    Predictions from aerodynamic theory often match biological observations very poorly. Many insects and several bird species habitually hover, frequently flying at low advance ratios. Taking helicopter-based aerodynamic theory, wings functioning predominantly for hovering, even for quite small insects, should operate at low angles of attack. However, insect wings operate at very high angles of attack during hovering; reduction in angle of attack should result in considerable energetic savings. Here, I consider the possibility that selection of kinematics is constrained from being aerodynamically optimal due to the inertial power requirements of flapping. Potential increases in aerodynamic efficiency with lower angles of attack during hovering may be outweighed by increases in inertial power due to the associated increases in flapping frequency. For simple hovering, traditional rotary-winged helicopter-like micro air vehicles would be more efficient than their flapping biomimetic counterparts. However, flapping may confer advantages in terms of top speed and manoeuvrability. If flapping-winged micro air vehicles are required to hover or loiter more efficiently, dragonflies and mayflies suggest biomimetic solutions.

  15. A graph-based system for network-vulnerability analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Swiler, L.P.; Phillips, C.

    1998-06-01

    This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks,more » broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.« less

  16. Emerging spectra of singular correlation matrices under small power-map deformations

    NASA Astrophysics Data System (ADS)

    Vinayak; Schäfer, Rudi; Seligman, Thomas H.

    2013-09-01

    Correlation matrices are a standard tool in the analysis of the time evolution of complex systems in general and financial markets in particular. Yet most analysis assume stationarity of the underlying time series. This tends to be an assumption of varying and often dubious validity. The validity of the assumption improves as shorter time series are used. If many time series are used, this implies an analysis of highly singular correlation matrices. We attack this problem by using the so-called power map, which was introduced to reduce noise. Its nonlinearity breaks the degeneracy of the zero eigenvalues and we analyze the sensitivity of the so-emerging spectra to correlations. This sensitivity will be demonstrated for uncorrelated and correlated Wishart ensembles.

  17. Emerging spectra of singular correlation matrices under small power-map deformations.

    PubMed

    Vinayak; Schäfer, Rudi; Seligman, Thomas H

    2013-09-01

    Correlation matrices are a standard tool in the analysis of the time evolution of complex systems in general and financial markets in particular. Yet most analysis assume stationarity of the underlying time series. This tends to be an assumption of varying and often dubious validity. The validity of the assumption improves as shorter time series are used. If many time series are used, this implies an analysis of highly singular correlation matrices. We attack this problem by using the so-called power map, which was introduced to reduce noise. Its nonlinearity breaks the degeneracy of the zero eigenvalues and we analyze the sensitivity of the so-emerging spectra to correlations. This sensitivity will be demonstrated for uncorrelated and correlated Wishart ensembles.

  18. Analysis of oscillatory motion of a light airplane at high values of lift coefficient

    NASA Technical Reports Server (NTRS)

    Batterson, J. G.

    1983-01-01

    A modified stepwise regression is applied to flight data from a light research air-plane operating at high angles at attack. The well-known phenomenon referred to as buckling or porpoising is analyzed and modeled using both power series and spline expansions of the aerodynamic force and moment coefficients associated with the longitudinal equations of motion.

  19. Autonomic nervous function in patients with Meniere's disease evaluated by power spectral analysis of heart rate variability.

    PubMed

    Yamada, M; Mizuta, K; Ito, Y; Furuta, M; Sawai, S; Miyata, H

    1999-10-01

    A hypothesis has been advanced that the autonomic nervous dysfunction (AND) relates to the development of vertigo in Meniere's disease (MD). We also studied the causal relationship between AND and vertigo in MD. We evaluated autonomic nervous function in 17 patients with MD (five men and 12 women ranging in age from 16 to 70 years) by classifying them by their stages of attack and interval of vertigo and with power spectral analysis (PSA) of heart rate variability. Fourteen healthy volunteers were also tested as controls. At the interval stage, parasympathetic nervous hypofunction and significant depression of sympathetic response due to postural changes from the supine to the standing position were observed in many of those patients. At the attack stage, sympathetic nervous hypofunction was observed in some of the patients. These findings lead us to the conclusion that AND relates to vertigo in MD as a predisposing factor. However, the question of whether AND relates as a trigger or as a consequence of vertigo in MD has not been adequately solved in this study. We will make further studies on circadian variation of autonomic nervous function.

  20. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.

    PubMed

    Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong

    2016-11-24

    Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

  1. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

    PubMed Central

    Li, Xuran; Dai, Hong-Ning; Wang, Hao; Xiao, Hong

    2016-01-01

    Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications. PMID:27886154

  2. Hiding Critical Targets in Smart Grid Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bao, Wei; Li, Qinghua

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromisedmore » nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.« less

  3. Computational Analysis of Powered Lift Augmentation for the LEAPTech Distributed Electric Propulsion Wing

    NASA Technical Reports Server (NTRS)

    Deere, Karen A.; Viken, Sally A.; Carter, Melissa B.; Viken, Jeffrey K.; Wiese, Michael R.; Farr, Norma L.

    2017-01-01

    A computational study of a distributed electric propulsion wing with a 40deg flap deflection has been completed using FUN3D. Two lift-augmentation power conditions were compared with the power-off configuration on the high-lift wing (40deg flap) at a 73 mph freestream flow and for a range of angles of attack from -5 degrees to 14 degrees. The computational study also included investigating the benefit of corotating versus counter-rotating propeller spin direction to powered-lift performance. The results indicate a large benefit in lift coefficient, over the entire range of angle of attack studied, by using corotating propellers that all spin counter to the wingtip vortex. For the landing condition, 73 mph, the unpowered 40deg flap configuration achieved a maximum lift coefficient of 2.3. With high-lift blowing the maximum lift coefficient increased to 5.61. Therefore, the lift augmentation is a factor of 2.4. Taking advantage of the fullspan lift augmentation at similar performance means that a wing powered with the distributed electric propulsion system requires only 42 percent of the wing area of the unpowered wing. This technology will allow wings to be 'cruise optimized', meaning that they will be able to fly closer to maximum lift over drag conditions at the design cruise speed of the aircraft.

  4. Hummingbird wing efficacy depends on aspect ratio and compares with helicopter rotors

    PubMed Central

    Kruyt, Jan W.; Quicazán-Rubio, Elsa M.; van Heijst, GertJan F.; Altshuler, Douglas L.; Lentink, David

    2014-01-01

    Hummingbirds are the only birds that can sustain hovering. This unique flight behaviour comes, however, at high energetic cost. Based on helicopter and aeroplane design theory, we expect that hummingbird wing aspect ratio (AR), which ranges from about 3.0 to 4.5, determines aerodynamic efficacy. Previous quasi-steady experiments with a wing spinner set-up provide no support for this prediction. To test this more carefully, we compare the quasi-steady hover performance of 26 wings, from 12 hummingbird taxa. We spun the wings at angular velocities and angles of attack that are representative for every species and measured lift and torque more precisely. The power (aerodynamic torque × angular velocity) required to lift weight depends on aerodynamic efficacy, which is measured by the power factor. Our comparative analysis shows that AR has a modest influence on lift and drag forces, as reported earlier, but interspecific differences in power factor are large. During the downstroke, the power required to hover decreases for larger AR wings at the angles of attack at which hummingbirds flap their wings (p < 0.05). Quantitative flow visualization demonstrates that variation in hover power among hummingbird wings is driven by similar stable leading edge vortices that delay stall during the down- and upstroke. A side-by-side aerodynamic performance comparison of hummingbird wings and an advanced micro helicopter rotor shows that they are remarkably similar. PMID:25079868

  5. A framework for analyzing the impact of data integrity/quality on electricity market operations

    NASA Astrophysics Data System (ADS)

    Choi, Dae Hyun

    This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real-time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant's perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today's state estimation software. In the second part, we investigate from a system operator's perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid.

  6. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less

  7. S-Boxes Based on Affine Mapping and Orbit of Power Function

    NASA Astrophysics Data System (ADS)

    Khan, Mubashar; Azam, Naveed Ahmed

    2015-06-01

    The demand of data security against computational attacks such as algebraic, differential, linear and interpolation attacks has been increased as a result of rapid advancement in the field of computation. It is, therefore, necessary to develop such cryptosystems which can resist current cryptanalysis and more computational attacks in future. In this paper, we present a multiple S-boxes scheme based on affine mapping and orbit of the power function used in Advanced Encryption Standard (AES). The proposed technique results in 256 different S-boxes named as orbital S-boxes. Rigorous tests and comparisons are performed to analyse the cryptographic strength of each of the orbital S-boxes. Furthermore, gray scale images are encrypted by using multiple orbital S-boxes. Results and simulations show that the encryption strength of the orbital S-boxes against computational attacks is better than that of the existing S-boxes.

  8. Investigation of High-alpha Lateral-directional Control Power Requirements for High-performance Aircraft

    NASA Technical Reports Server (NTRS)

    Foster, John V.; Ross, Holly M.; Ashley, Patrick A.

    1993-01-01

    Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high-angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high-angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes ground-based piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.

  9. Investigation of high-alpha lateral-directional control power requirements for high-performance aircraft

    NASA Technical Reports Server (NTRS)

    Foster, John V.; Ross, Holly M.; Ashley, Patrick A.

    1993-01-01

    Designers of the next-generation fighter and attack airplanes are faced with the requirements of good high angle-of-attack maneuverability as well as efficient high speed cruise capability with low radar cross section (RCS) characteristics. As a result, they are challenged with the task of making critical design trades to achieve the desired levels of maneuverability and performance. This task has highlighted the need for comprehensive, flight-validated lateral-directional control power design guidelines for high angles of attack. A joint NASA/U.S. Navy study has been initiated to address this need and to investigate the complex flight dynamics characteristics and controls requirements for high angle-of-attack lateral-directional maneuvering. A multi-year research program is underway which includes groundbased piloted simulation and flight validation. This paper will give a status update of this program that will include a program overview, description of test methodology and preliminary results.

  10. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong L.

    The Stuxnet attack at the Natanz facility is an example of a targeted and successful cyber attack on a nuclear facility. Snowden's release of National Security Agency documents demonstrated the consequences of the insider threat. More recently, the United States tried to attack North Korea but failed, South Korea was attempting to attack North Korea, and both applied Stuxnet-like approaches. These sophisticated targeted attacks differ from web-site hacking events that are reported almost daily in the news mainly because targeted attacks require detailed design and operation information of the systems attacked and/or are often carried out by insiders. For instance,more » in order to minimize disruption of facilities around the world, Stuxnet remained idle until it recognized the specific configuration of the Natanz facility, demonstrating that the attackers possessed extremely detailed information about the facility. Such targeted cyber attacks could become a national-level military weapon and be used in coercion of hostile countries.« less

  11. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less

  12. Easing the Arctic Tension: An Economic Solution

    DTIC Science & Technology

    2010-12-01

    much power as possible to both serve as a deterrent from potential attack as well as to protect themselves if attacked.23 Realists such as John J ...determine their circumstances and fate.” 22 Hans J . Morgenthau, Politics Among Nations: The Struggle for Power and Peace (New York: Alfred A . Knopf...for the state, 115 Ugo Bardi , "Peak Oil: The Four Stages of a New Idea," Energy 34, no. 3 (March 2009

  13. Optimizing a tandem disk model

    NASA Astrophysics Data System (ADS)

    Healey, J. V.

    1983-08-01

    The optimum values of the solidity ratio, tip speed ratio (TSR), and the preset angle of attack, the corresponding distribution, and the breakdown mechanism for a tandem disk model for a crosswind machine such as a Darrieus are examined analytically. Equations are formulated for thin blades with zero drag in consideration of two plane rectangular disks, both perpendicular to the wind flow. Power coefficients are obtained for both disks and comparisons are made between a single-disk system and a two-disk system. The power coefficient for the tandem disk model is shown to be a sum of the coefficients of the individual disks, with a maximum value of twice the Betz limit at an angle of attack of -1 deg and the TSR between 4-7. The model, applied to the NACA 0012 profile, gives a maximum power coefficient of 0.967 with a solidity ratio of 0.275 and highly limited ranges for the angle of attack and TSR.

  14. Hypersonic Inlet for a Laser Powered Propulsion System

    NASA Astrophysics Data System (ADS)

    Harrland, Alan; Doolan, Con; Wheatley, Vincent; Froning, Dave

    2011-11-01

    Propulsion within the lightcraft concept is produced via laser induced detonation of an incoming hypersonic air stream. This process requires suitable engine configurations that offer good performance over all flight speeds and angles of attack to ensure the required thrust is maintained. Stream traced hypersonic inlets have demonstrated the required performance in conventional hydrocarbon fuelled scramjet engines, and has been applied to the laser powered lightcraft vehicle. This paper will outline the current methodology employed in the inlet design, with a particular focus on the performance of the lightcraft inlet at angles of attack. Fully three-dimensional turbulent computational fluid dynamics simulations have been performed on a variety of inlet configurations. The performance of the lightcraft inlets have been evaluated at differing angles of attack. An idealized laser detonation simulation has also been performed to validate that the lightcraft inlet does not unstart during the laser powered propulsion cycle.

  15. SecureCPS: Defending a nanosatellite cyber-physical system

    NASA Astrophysics Data System (ADS)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  16. Network robustness assessed within a dual connectivity framework: joint dynamics of the Active and Idle Networks.

    PubMed

    Tejedor, Alejandro; Longjas, Anthony; Zaliapin, Ilya; Ambroj, Samuel; Foufoula-Georgiou, Efi

    2017-08-17

    Network robustness against attacks has been widely studied in fields as diverse as the Internet, power grids and human societies. But current definition of robustness is only accounting for half of the story: the connectivity of the nodes unaffected by the attack. Here we propose a new framework to assess network robustness, wherein the connectivity of the affected nodes is also taken into consideration, acknowledging that it plays a crucial role in properly evaluating the overall network robustness in terms of its future recovery from the attack. Specifically, we propose a dual perspective approach wherein at any instant in the network evolution under attack, two distinct networks are defined: (i) the Active Network (AN) composed of the unaffected nodes and (ii) the Idle Network (IN) composed of the affected nodes. The proposed robustness metric considers both the efficiency of destroying the AN and that of building-up the IN. We show, via analysis of well-known prototype networks and real world data, that trade-offs between the efficiency of Active and Idle Network dynamics give rise to surprising robustness crossovers and re-rankings, which can have significant implications for decision making.

  17. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    PubMed

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  18. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    PubMed Central

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-01-01

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. PMID:24721764

  19. Seven Deadliest Network Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less

  20. SERC 2014-2018 Technical Plan

    DTIC Science & Technology

    2013-10-25

    assurance-case analysis that are not only more powerful in anomaly detection , but also leading to stronger possibilities for positive assurance and to...PAGES 50 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified Standard Form 298 (Rev. 8...base for responding to cyber-attacks; and ( c ) combine techniques developed for automatic control systems in a manner that will both enable defense

  1. Research in Computer Forensics

    DTIC Science & Technology

    2002-06-01

    systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to

  2. The contribution of collective attack tactics in differentiating handball score efficiency.

    PubMed

    Rogulj, Nenad; Srhoj, Vatromir; Srhoj, Ljerka

    2004-12-01

    The prevalence of 19 elements of collective tactics in score efficient and score inefficient teams was analyzed in 90 First Croatian Handball League--Men games during the 1998-1999 season. Prediction variables were used to describe duration, continuity, system, organization and spatial direction of attacks. Analysis of the basic descriptive and distribution statistical parameters revealed normal distribution of all variables and possibility to use multivariate methods. Canonic discrimination analysis and analysis of variance showed the use of collective tactics elements on attacks to differ statistically significantly between the winning and losing teams. Counter-attacks and uninterrupted attacks predominate in winning teams. Other types of attacks such as long position attack, multiply interrupted attack, attack with one circle runner attack player/pivot, attack based on basic principles, attack based on group cooperation, attack based on independent action, attack based on group maneuvering, rightward directed attack and leftward directed attack predominate in losing teams. Winning teams were found to be clearly characterized by quick attacks against unorganized defense, whereas prolonged, interrupted position attacks against organized defense along with frequent and diverse tactical actions were characteristic of losing teams. The choice and frequency of using a particular tactical activity in position attack do not warrant score efficiency but usually are consequential to the limited anthropologic potential and low level of individual technical-tactical skills of the players in low-quality teams.

  3. Resilience Metrics for the Electric Power System: A Performance-Based Approach.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vugrin, Eric D.; Castillo, Andrea R; Silva-Monroy, Cesar Augusto

    Grid resilience is a concept related to a power system's ability to continue operating and delivering power even in the event that low probability, high-consequence disruptions such as hurricanes, earthquakes, and cyber-attacks occur. Grid resilience objectives focus on managing and, ideally, minimizing potential consequences that occur as a result of these disruptions. Currently, no formal grid resilience definitions, metrics, or analysis methods have been universally accepted. This document describes an effort to develop and describe grid resilience metrics and analysis methods. The metrics and methods described herein extend upon the Resilience Analysis Process (RAP) developed by Watson et al. formore » the 2015 Quadrennial Energy Review. The extension allows for both outputs from system models and for historical data to serve as the basis for creating grid resilience metrics and informing grid resilience planning and response decision-making. This document describes the grid resilience metrics and analysis methods. Demonstration of the metrics and methods is shown through a set of illustrative use cases.« less

  4. An Approach for Assessing Consequences of Potential Supply Chain and Insider Contributed Cyber Attacks on Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chu, Tsong-Lun; Varuttamaseni, Athi; Baek, Joo-Seok

    This paper provides an approach for developing potential attacks on I and C systems of NPPs and assessing their consequences. An important concept is that the NPPs were not designed to cope with Stuxnet-type of attacks (and any other cyber attacks). That is, the plants were only designed for design basis accidents. The safety margins and redundancies built in the design are all based on design basis accidents. They may be helpful in mitigating cyberattacks, but may not be adequate.

  5. CPAD: Cyber-Physical Attack Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ferragut, Erik M; Laska, Jason A

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  6. Optimizing the robustness of electrical power systems against cascading failures.

    PubMed

    Zhang, Yingrui; Yağan, Osman

    2016-06-21

    Electrical power systems are one of the most important infrastructures that support our society. However, their vulnerabilities have raised great concern recently due to several large-scale blackouts around the world. In this paper, we investigate the robustness of power systems against cascading failures initiated by a random attack. This is done under a simple yet useful model based on global and equal redistribution of load upon failures. We provide a comprehensive understanding of system robustness under this model by (i) deriving an expression for the final system size as a function of the size of initial attacks; (ii) deriving the critical attack size after which system breaks down completely; (iii) showing that complete system breakdown takes place through a first-order (i.e., discontinuous) transition in terms of the attack size; and (iv) establishing the optimal load-capacity distribution that maximizes robustness. In particular, we show that robustness is maximized when the difference between the capacity and initial load is the same for all lines; i.e., when all lines have the same redundant space regardless of their initial load. This is in contrast with the intuitive and commonly used setting where capacity of a line is a fixed factor of its initial load.

  7. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets.

    PubMed

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set.

  8. Exploiting Small Leakages in Masks to Turn a Second-Order Attack into a First-Order Attack and Improved Rotating Substitution Box Masking with Linear Code Cosets

    PubMed Central

    DeTrano, Alexander; Karimi, Naghmeh; Karri, Ramesh; Guo, Xiaofei; Carlet, Claude; Guilley, Sylvain

    2015-01-01

    Masking countermeasures, used to thwart side-channel attacks, have been shown to be vulnerable to mask-extraction attacks. State-of-the-art mask-extraction attacks on the Advanced Encryption Standard (AES) algorithm target S-Box recomputation schemes but have not been applied to scenarios where S-Boxes are precomputed offline. We propose an attack targeting precomputed S-Boxes stored in nonvolatile memory. Our attack targets AES implemented in software protected by a low entropy masking scheme and recovers the masks with 91% success rate. Recovering the secret key requires fewer power traces (in fact, by at least two orders of magnitude) compared to a classical second-order attack. Moreover, we show that this attack remains viable in a noisy environment or with a reduced number of leakage points. Eventually, we specify a method to enhance the countermeasure by selecting a suitable coset of the masks set. PMID:26491717

  9. Hybrid Wing Body (HWB) Slat Noise Analysis

    NASA Technical Reports Server (NTRS)

    Guo, Yueping; Brunsniak, Leon; Czech, Michael; Thomas, Russell H.

    2013-01-01

    This paper presents an analysis of the slat noise for Hybrid Wing Body (HWB) aircraft, based on a database from a 3% scale wind tunnel test. It is shown that the HWB slats are one of the dominant noise components, characterized by its broad spectral shape with a peak frequency that depends on both the mean flow velocity and the aircraft angle of attack, the former following the conventional Strouhal number scaling and the latter explainable by the dependence of the coherence length of the slat unsteady flows on the aircraft angle of attack. While the overall levels of the slat noise are shown to approximately follow the fifth power law in the flow Mach number, the effects of the Mach number manifest themselves in the noise spectra in both the amplitude and the spectral shape. The slat noise amplitude is shown to also depend on the angle of attack, assuming a minimum in the range of 3 to 5 degrees and increasing when the angle of attack moves away from this range. These features are all modeled and incorporated in slat noise prediction methodologies, extending the prediction capability from conventional aircraft designs to HWB configurations. Comparisons between predictions and data show very good agreements both in various parametric trends and in the absolute levels. The HWB aircraft is designed to operate at angles of attack much higher than those of conventional aircraft. This is shown to significantly increase the HWB slat noise. To further illustrate, the test data are extrapolated to full scale and compared with the slat noise of the Boeing 777 aircraft, showing that the former is higher the latter.

  10. A Robust and Resilient Network Design Paradigm for Region-Based Faults Inflicted by WMD Attack

    DTIC Science & Technology

    2016-04-01

    MEASUREMENTS FOR GRID MONITORING AND CONTROL AGAINST POSSIBLE WMD ATTACKS We investigated big data processing of PMU measurements for grid monitoring and...control against possible WMD attacks. Big data processing and analytics of synchrophasor measurements, collected from multiple locations of power grids...collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources

  11. China’s Near Seas Combat Capabilities (China Maritime Study, Number 11)

    DTIC Science & Technology

    2014-02-01

    Chinese writings stress preemptive attacks on key U.S. power-projection capabili- ties—including aircraft carriers—prior to or quickly following formal...attack craft consistently stress covert, long-range attacks taking advantage of stealth, surprise, and standoff ranges. A final factor that supports...craft tenders, but this is speculative.56 The 2010 Chinese defense white paper does stress , however, that sea-based china’s near seas combat

  12. Decision and Game Theory for Security

    NASA Astrophysics Data System (ADS)

    Alpcan, Tansu; Buttyán, Levente; Baras, John S.

    Attack--defense trees are used to describe security weaknesses of a system and possible countermeasures. In this paper, the connection between attack--defense trees and game theory is made explicit. We show that attack--defense trees and binary zero-sum two-player extensive form games have equivalent expressive power when considering satisfiability, in the sense that they can be converted into each other while preserving their outcome and their internal structure.

  13. War or Peace? How the Subjective Perception of Great Power Interdependence Shapes Preemptive Defensive Aggression

    PubMed Central

    Jing, Yiming; Gries, Peter H.; Li, Yang; Stivers, Adam W.; Mifune, Nobuhiro; Kuhlman, D. M.; Bai, Liying

    2017-01-01

    Why do great powers with benign intentions end up fighting each other in wars they do not seek? We utilize an incentivized, two-person “Preemptive Strike Game” (PSG) to explore how the subjective perception of great power interdependence shapes defensive aggression against persons from rival great powers. In Study 1, college students from the United States (N = 115), China (N = 106), and Japan (N = 99) made PSG decisions facing each other. This natural experiment revealed that Chinese and Japanese participants (a) made more preemptive attacks against each other and Americans than against their compatriots, and that (b) greater preexisting perceptions of bilateral competition increased intergroup attack rates. In Study 2, adult Americans (N = 127) watched real CNN expert interviews portraying United States–China economic interdependence as more positive or negative. This randomized experiment revealed that the more positive portrayal reduced preemptive American strikes against Chinese (but not Japanese), while the more negative portrayal amplified American anger about China’s rise, increasing preemptive attacks against Chinese. We also found, however, that preemptive strikes were primarily defensive and not offensive. Interventions to reduce defensive aggression and promote great power peace are discussed. PMID:28626433

  14. War or Peace? How the Subjective Perception of Great Power Interdependence Shapes Preemptive Defensive Aggression.

    PubMed

    Jing, Yiming; Gries, Peter H; Li, Yang; Stivers, Adam W; Mifune, Nobuhiro; Kuhlman, D M; Bai, Liying

    2017-01-01

    Why do great powers with benign intentions end up fighting each other in wars they do not seek? We utilize an incentivized, two-person "Preemptive Strike Game" (PSG) to explore how the subjective perception of great power interdependence shapes defensive aggression against persons from rival great powers. In Study 1, college students from the United States ( N = 115), China ( N = 106), and Japan ( N = 99) made PSG decisions facing each other. This natural experiment revealed that Chinese and Japanese participants (a) made more preemptive attacks against each other and Americans than against their compatriots, and that (b) greater preexisting perceptions of bilateral competition increased intergroup attack rates. In Study 2, adult Americans ( N = 127) watched real CNN expert interviews portraying United States-China economic interdependence as more positive or negative. This randomized experiment revealed that the more positive portrayal reduced preemptive American strikes against Chinese (but not Japanese), while the more negative portrayal amplified American anger about China's rise, increasing preemptive attacks against Chinese. We also found, however, that preemptive strikes were primarily defensive and not offensive. Interventions to reduce defensive aggression and promote great power peace are discussed.

  15. Decrease in Ground-Run Distance of Small Airplanes by Applying Electrically-Driven Wheels

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hiroshi; Nishizawa, Akira

    A new takeoff method for small airplanes was proposed. Ground-roll performance of an airplane driven by electrically-powered wheels was experimentally and computationally studied. The experiments verified that the ground-run distance was decreased by half with a combination of the powered driven wheels and propeller without increase of energy consumption during the ground-roll. The computational analysis showed the ground-run distance of the wheel-driven aircraft was independent of the motor power when the motor capability exceeded the friction between tires and ground. Furthermore, the distance was minimized when the angle of attack was set to the value so that the wing generated negative lift.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  17. Quantitative patterns in drone wars

    NASA Astrophysics Data System (ADS)

    Garcia-Bernardo, Javier; Dodds, Peter Sheridan; Johnson, Neil F.

    2016-02-01

    Attacks by drones (i.e., unmanned combat air vehicles) continue to generate heated political and ethical debates. Here we examine the quantitative nature of drone attacks, focusing on how their intensity and frequency compare with that of other forms of human conflict. Instead of the power-law distribution found recently for insurgent and terrorist attacks, the severity of attacks is more akin to lognormal and exponential distributions, suggesting that the dynamics underlying drone attacks lie beyond these other forms of human conflict. We find that the pattern in the timing of attacks is consistent with one side having almost complete control, an important if expected result. We show that these novel features can be reproduced and understood using a generative mathematical model in which resource allocation to the dominant side is regulated through a feedback loop.

  18. Method and tool for network vulnerability analysis

    DOEpatents

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  19. Modeling and Managing Risk in Billing Infrastructures

    NASA Astrophysics Data System (ADS)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

  20. Clinical significance of delta neutrophil index in the differential diagnosis between septic arthritis and acute gout attack within 24 hours after hospitalization

    PubMed Central

    Pyo, Jung Yoon; Kim, Dae Sik; Jung, Seung Min; Song, Jason Jungsik; Park, Yong-Beom; Lee, Sang-Won

    2017-01-01

    Abstract The most important differential diagnoses of acute monoarticular arthritis are septic arthritis and acute gout attack. Identifying infection is crucial in preventing the devastating outcome of septic arthritis. The delta neutrophil index (DNI) is a value that corresponds to the fraction of circulating immature granulocytes. As DNI reflects the burden of infection, we evaluated this index as a differentiating marker between septic arthritis and acute gout attack. The medical records of 149 patients with septic arthritis and 194 patients with acute gout attack were reviewed. A specific cell analyzer, ADVIA 2120, was used to measure DNI. Clinical and laboratory markers associated with predicting septic arthritis were assessed by using logistic regression. Patients with septic arthritis showed higher levels of DNI than those with acute gout attack (3.3 vs 0.6%, P < .001). Similar results were observed in patients without monosodium urate (MSU) crystal confirmation or those with normouricemia (3.3 vs 0.5 and 3.1 vs 0.7%, respectively; P < .001 for both). A DNI level of 1.9% was determined as the cutoff value for predicting septic arthritis. In the multivariate analysis, DNI was the most powerful independent value for predicting septic arthritis (odds ratio 14.003). This study showed the possibility of using DNI as a differentiating marker between septic arthritis and acute gout attack at the crucial early phase. DNI showed its relevance regardless of confirmation of MSU crystal deposition or serum level of uric acid. PMID:28746185

  1. Using Reputation Based Trust to Overcome Malfunctions and Malicious Failures in Electric Power Protection Systems

    DTIC Science & Technology

    2011-09-01

    concert with a physical attack. Additionally, the importance of preventive measures implemented by a social human network to counteract a cyber attack...integrity of the data stored on specific computers. This coordinated cyber attack would have been successful if not for the trusted social network...established by Mr. Hillar Aarelaid, head of the Estonian computer 6 emergency response team (CERT). This social network consisted of Mr. Hillar Aarelaid

  2. Development of an Unmanned Air Research Vehicle for Supermaneuverability Studies

    DTIC Science & Technology

    1990-03-29

    VORTEX CONTROL Another emerging concept involves strake- generated vortex interactions, which improves maneuverability using non-linear lift generated by...undisturbed flow and is capable of prcJucing powerful vortex flow fields at high angles of attack. Asymmetrical vort ,;x control is feasible with actuated...control configuration, serves as an initial test vehicle for supermaneuverability analysis . Due to the relatively small scale of the UAV and the use of

  3. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    PubMed Central

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  4. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks.

    PubMed

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-11-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users' network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders' or receivers' identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  5. An AES chip with DPA resistance using hardware-based random order execution

    NASA Astrophysics Data System (ADS)

    Bo, Yu; Xiangyu, Li; Cong, Chen; Yihe, Sun; Liji, Wu; Xiangmin, Zhang

    2012-06-01

    This paper presents an AES (advanced encryption standard) chip that combats differential power analysis (DPA) side-channel attack through hardware-based random order execution. Both decryption and encryption procedures of an AES are implemented on the chip. A fine-grained dataflow architecture is proposed, which dynamically exploits intrinsic byte-level independence in the algorithm. A novel circuit called an HMF (Hold-Match-Fetch) unit is proposed for random control, which randomly sets execution orders for concurrent operations. The AES chip was manufactured in SMIC 0.18 μm technology. The average energy for encrypting one group of plain texts (128 bits secrete keys) is 19 nJ. The core area is 0.43 mm2. A sophisticated experimental setup was built to test the DPA resistance. Measurement-based experimental results show that one byte of a secret key cannot be disclosed from our chip under random mode after 64000 power traces were used in the DPA attack. Compared with the corresponding fixed order execution, the hardware based random order execution is improved by at least 21 times the DPA resistance.

  6. Nonlinear time-series-based adaptive control applications

    NASA Technical Reports Server (NTRS)

    Mohler, R. R.; Rajkumar, V.; Zakrzewski, R. R.

    1991-01-01

    A control design methodology based on a nonlinear time-series reference model is presented. It is indicated by highly nonlinear simulations that such designs successfully stabilize troublesome aircraft maneuvers undergoing large changes in angle of attack as well as large electric power transients due to line faults. In both applications, the nonlinear controller was significantly better than the corresponding linear adaptive controller. For the electric power network, a flexible AC transmission system with series capacitor power feedback control is studied. A bilinear autoregressive moving average reference model is identified from system data, and the feedback control is manipulated according to a desired reference state. The control is optimized according to a predictive one-step quadratic performance index. A similar algorithm is derived for control of rapid changes in aircraft angle of attack over a normally unstable flight regime. In the latter case, however, a generalization of a bilinear time-series model reference includes quadratic and cubic terms in angle of attack.

  7. Robustness of power systems under a democratic-fiber-bundle-like model

    NASA Astrophysics Data System (ADS)

    Yaǧan, Osman

    2015-06-01

    We consider a power system with N transmission lines whose initial loads (i.e., power flows) L1,...,LN are independent and identically distributed with PL(x ) =P [L ≤x ] . The capacity Ci defines the maximum flow allowed on line i and is assumed to be given by Ci=(1 +α ) Li , with α >0 . We study the robustness of this power system against random attacks (or failures) that target a p fraction of the lines, under a democratic fiber-bundle-like model. Namely, when a line fails, the load it was carrying is redistributed equally among the remaining lines. Our contributions are as follows. (i) We show analytically that the final breakdown of the system always takes place through a first-order transition at the critical attack size p=1 -E/[L ] maxx(P [L >x ](α x +E [L |L >x ]) ) , where E [.] is the expectation operator; (ii) we derive conditions on the distribution PL(x ) for which the first-order breakdown of the system occurs abruptly without any preceding diverging rate of failure; (iii) we provide a detailed analysis of the robustness of the system under three specific load distributions—uniform, Pareto, and Weibull—showing that with the minimum load Lmin and mean load E [L ] fixed, Pareto distribution is the worst (in terms of robustness) among the three, whereas Weibull distribution is the best with shape parameter selected relatively large; (iv) we provide numerical results that confirm our mean-field analysis; and (v) we show that p is maximized when the load distribution is a Dirac delta function centered at E [L ] , i.e., when all lines carry the same load. This last finding is particularly surprising given that heterogeneity is known to lead to high robustness against random failures in many other systems.

  8. Prediction of the noise from a propeller at angle of attack

    NASA Technical Reports Server (NTRS)

    Krejsa, Eugene A.

    1990-01-01

    An analysis is presented to predict the noise of a propeller at angle of attack. The analysis is an extension of that reported by Mani which predicted the change in noise due to angle of attack to both unsteady loading and to azimuthal variation of the radiation efficiency of steady noise sources. Mani's analysis, however, was limited to small angles of attack. The analysis reported herein removes this small angle limitation. Results from the analysis are compared with the data of Woodward for a single rotation propeller and a counter rotating propeller. The comparison shows that including the effect of angle of attack on the steady noise sources significantly improves the agreement with data. Including higher order effects of angle of attack, while changing the predicted noise at far forward and aft angles, has little effect near the propeller plane.

  9. The Future of Air Power in the Aftermath of the Gulf War

    DTIC Science & Technology

    1992-07-01

    strategic-nuclear capabilities, for which the deterrence of direct nuclear attack against the United States itself was always a lesser-included case of a...conflicts, when there are only low-value, low-contrast targets in most cases . In regard to the 20 US MILITARY STRATEGY geographic setting, the attack...navigated over their intended targets to drop laser-guided glide bombs within three feet of the aim points, with the concurrent filming of the attack

  10. Experimental investigation of forebody and wing leading-edge vortex interactions at high angles of attack

    NASA Technical Reports Server (NTRS)

    Erickson, G. E.; Gilbert, W. P.

    1983-01-01

    An experimental investigation was conducted to assess the vortex flow-field interactions on an advanced, twin-jet fighter aircraft configuration at high angles of attack. Flow-field surveys were conducted on a small-scale model in the Northrop 0.41 - by 0.60-meter water tunnel and, where appropriate, the qualitative observations were correlated with low-speed wind tunnel data trends obtained on a large-scale model of the advanced fighter in the NASA Langley Research Center 30- by 60-foot (9.1- by 18.3-meter) facility. Emphasis was placed on understanding the interactions of the forebody and LEX-wing vortical flows, defining the effects on rolling moment variation with sideslip, and identifying modifications to control or regulate the vortex interactions at high angles of attack. The water tunnel flow visualization results and wind tunnel data trend analysis revealed the potential for strong interactions between the forebody and LEX vortices at high angles of attack. In particular, the forebody flow development near the nose could be controlled by means of carefully-positioned radome strakes. The resultant strake-induced flow-field changes were amplified downstream by the more powerful LEX vortical motions with subsequent large effects on wing flow separation characteristics.

  11. A Roundtable on the Soviet Union: Kuda?, Kogda?, S. Kem

    DTIC Science & Technology

    1989-05-01

    in Soviet foreign policy. In December 1988, while Gorbachev was on a "vacation," Shcherbitsky, Ligachev, and Vorotnikov pontificated about agricultural ... policy . While these attacks indicate that Gorbachev does not enjoy uniform support, his ability to remain in power despite these stringent attacks suggests his resiliency.

  12. A reference model for model-based design of critical infrastructure protection systems

    NASA Astrophysics Data System (ADS)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits over the traditional design methodology of repeating requirements analysis and system design.

  13. Prediction of the noise from a propeller at angle of attack

    NASA Technical Reports Server (NTRS)

    Krejsa, Eugene A.

    1990-01-01

    An analysis is presented to predict the noise of a propeller at angle of attack. The analysis is an extension of that reported by Mani (1990) which predicted the change in noise due to angle of attack due to both unsteady loading and to azimuthal variation of the radiation efficiency of steady noise sources. Mani's analysis, however, was limited to small angles of attack. The analysis reported herein removes this small angle limitation. Results from the analysis are compared with the data of Woodward (1987, 1988), for a single rotation propeller and for a counter rotating propeller. The comparison shows that including the effect of angle of attack on the steady noise sources significantly improves the agreement with data. Including higher order effects of angle of attack, while changing the predicted noise at far forward and aft angles, has little effect near the propeller plane.

  14. The balance and harmony of control power for a combat aircraft in tactical maneuvering

    NASA Technical Reports Server (NTRS)

    Bocvarov, Spiro; Cliff, Eugene M.; Lutze, Frederick H.

    1992-01-01

    An analysis is presented for a family of regular extremal attitude-maneuvers for the High Angle-of-Attack Research Vehicle that has thrust-vectoring capability. Different levels of dynamic coupling are identified in the combat aircraft attitude model, and the characteristic extremal-family motion is explained. It is shown why the extremal-family trajectories develop small sideslip-angles, a highly desirable feature from a practical viewpoint.

  15. Testbed-based Performance Evaluation of Attack Resilient Control for AGC

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashok, Aditya; Sridhar, Siddharth; McKinnon, Archibald D.

    The modern electric power grid is a complex cyber-physical system whose reliable operation is enabled by a wide-area monitoring and control infrastructure. This infrastructure, supported by an extensive communication backbone, enables several control applications functioning at multiple time scales to ensure the grid is maintained within stable operating limits. Recent events have shown that vulnerabilities in this infrastructure may be exploited to manipulate the data being exchanged. Such a scenario could cause the associated control application to mis-operate, potentially causing system-wide instabilities. There is a growing emphasis on looking beyond traditional cybersecurity solutions to mitigate such threats. In this papermore » we perform a testbed-based validation of one such solution - Attack Resilient Control (ARC) - on Iowa State University's \\textit{PowerCyber} testbed. ARC is a cyber-physical security solution that combines domain-specific anomaly detection and model-based mitigation to detect stealthy attacks on Automatic Generation Control (AGC). In this paper, we first describe the implementation architecture of the experiment on the testbed. Next, we demonstrate the capability of stealthy attack templates to cause forced under-frequency load shedding in a 3-area test system. We then validate the performance of ARC by measuring its ability to detect and mitigate these attacks. Our results reveal that ARC is efficient in detecting stealthy attacks and enables AGC to maintain system operating frequency close to its nominal value during an attack. Our studies also highlight the importance of testbed-based experimentation for evaluating the performance of cyber-physical security and control applications.« less

  16. Study of aerodynamic technology for VSTOL fighter/attack aircraft: Horizontal attitude concept

    NASA Technical Reports Server (NTRS)

    Brown, S. H.

    1978-01-01

    A horizontal attitude VSTOL (HAVSTOL) supersonic fighter attack aircraft powered by RALS turbofan propulsion system is analyzed. Reaction control for subaerodynamic flight is obtained in pitch and yaw from the RALS and roll from wingtip jets powered by bleed air from the RALS duct. Emphasis is placed on the development of aerodynamic characteristics and the identification of aerodynamic uncertainties. A wind tunnel program is shown to resolve some of the uncertainties. Aerodynamic data developed are static characteristics about all axes, control effectiveness, drag, propulsion induced effects and reaction control characteristics.

  17. Quantum private query with perfect user privacy against a joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Liu, Zhi-Chao; Li, Jian; Chen, Xiu-Bo; Zuo, Hui-Juan; Zhou, Yi-Hua; Shi, Wei-Min

    2016-12-01

    The joint-measurement (JM) attack is the most powerful threat to the database security for existing quantum-key-distribution (QKD)-based quantum private query (QPQ) protocols. Wei et al. (2016) [28] proposed a novel QPQ protocol against the JM attack. However, their protocol relies on two-way quantum communication thereby affecting its real implementation and communication efficiency. Moreover, it cannot ensure perfect user privacy. In this paper, we present a new one-way QPQ protocol in which the special way of classical post-processing of oblivious key ensures the security against the JM attack. Furthermore, it realizes perfect user privacy and lower complexity of communication.

  18. Defending Science Denial in Cyberspace

    NASA Astrophysics Data System (ADS)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  19. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  20. Emerging Techniques for Field Device Security

    DOE PAGES

    Schwartz, Moses; Bechtel Corp.; Mulder, John; ...

    2014-11-01

    Critical infrastructure, such as electrical power plants and oil refineries, rely on embedded devices to control essential processes. State of the art security is unable to detect attacks on these devices at the hardware or firmware level. We provide an overview of the hardware used in industrial control system field devices, look at how these devices have been attacked, and discuss techniques and new technologies that may be used to secure them. We follow three themes: (1) Inspectability, the capability for an external arbiter to monitor the internal state of a device. (2) Trustworthiness, the degree to which a systemmore » will continue to function correctly despite disruption, error, or attack. (3) Diversity, the use of adaptive systems and complexity to make attacks more difficult by reducing the feasible attack surface.« less

  1. Research and analysis on response characteristics of bracket-line coupling system under wind load

    NASA Astrophysics Data System (ADS)

    Jiayu, Zhao; Qing, Sun

    2018-01-01

    In this paper, a three-dimensional finite element model of bracket-line coupling system is established based on ANSYS software. Using the wind velocity time series which is generated by MATLAB as a power input, by comparing and analyzing the influence of different wind speeds and different wind attack angles, it is found that when 0 degree wind acts on the structure, wires have a certain damping effect in the bracket-line coupling system and at the same wind speed, the 90 degree direction is the most unfavorable wind direction for the whole structure according to the three kinds of angle wind calculated at present. In the bracket-line coupling system, the bracket structure is more sensitive to the increase of wind speed while the conductors are more sensitive to the change of wind attack angle.

  2. 75 FR 55659 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-13

    ...), I am continuing for 1 year the national emergency previously declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11, 2001, and the continuing and... national emergency declared on September 14, 2001, and the powers and authorities adopted to deal with that...

  3. 76 FR 56631 - Continuation of the National Emergency With Respect to Certain Terrorist Attacks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-13

    ... declared on September 14, 2001, in Proclamation 7463, with respect to the terrorist attacks of September 11... terrorist threat continues, the national emergency declared on September 14, 2001, and the powers and... September 14, 2001, with respect to the terrorist threat. This notice shall be published in the Federal...

  4. Towards a C2 Poly-Visualization Tool: Leveraging the Power of Social-Network Analysis and GIS

    DTIC Science & Technology

    2011-06-01

    from Magsino.14 AutoMap, a product of CASOS at Carnegie Mellon University, is a text-mining tool that enables the extraction of network data from...enables community leaders to prepare for biological attacks using computational models. BioWar is a CASOS package that combines many factors into a...models, demographically accurate agent modes, wind dispersion models, and an error-diagnostic model. Construct, also developed by CASOS , is a

  5. Aerodynamic comparison of a butterfly-like flapping wing-body model and a revolving-wing model

    NASA Astrophysics Data System (ADS)

    Suzuki, Kosuke; Yoshino, Masato

    2017-06-01

    The aerodynamic performance of flapping- and revolving-wing models is investigated by numerical simulations based on an immersed boundary-lattice Boltzmann method. As wing models, we use (i) a butterfly-like model with a body and flapping-rectangular wings and (ii) a revolving-wing model with the same wings as the flapping case. Firstly, we calculate aerodynamic performance factors such as the lift force, the power, and the power loading of the two models for Reynolds numbers in the range of 50-1000. For the flapping-wing model, the power loading is maximal for the maximum angle of attack of 90°, a flapping amplitude of roughly 45°, and a phase shift between the flapping angle and the angle of attack of roughly 90°. For the revolving-wing model, the power loading peaks for an angle of attack of roughly 45°. In addition, we examine the ground effect on the aerodynamic performance of the revolving-wing model. Secondly, we compare the aerodynamic performance of the flapping- and revolving-wing models at their respective maximal power loadings. It is found that the revolving-wing model is more efficient than the flapping-wing model both when the body of the latter is fixed and where it can move freely. Finally, we discuss the relative agilities of the flapping- and revolving-wing models.

  6. Fabricating niobium test loops for the SP-100 space reactor

    NASA Technical Reports Server (NTRS)

    Bryhan, Anthony J.; Chan, Ricky C.

    1993-01-01

    This article describes the successful fabrication, operation, and evaluation of a series of niobium-alloy (Nb-1 Zr and PWC-11) thermal convection loops designed to contain and circulate molten lithium at 1,350 K. These loops were used to establish the fabrication variables of significance for a nuclear power supply for space. Approximately 200 weldments were evaluated for their tendency to be attacked by lithium as a function of varying atmospheric contamination. No attack occurred for any weldment free of contamination, with or without heat treatment, and no welds accidentally deviated from purity. The threshold oxygen content for weldment attack was determined to be 170-200 ppm. Attack varied directly with weldment oxygen and nitrogen contents.

  7. Analysis of characteristics associated with reinjection of icatibant: Results from the icatibant outcome survey.

    PubMed

    Longhurst, Hilary J; Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Fabien, Vincent; Zanichelli, Andrea; Maurer, Marcus

    2015-01-01

    Phase 3 icatibant trials showed that most hereditary angioedema (HAE) (C1 inhibitor deficiency) acute attacks were treated successfully with one injection of icatibant, a selective bradykinin B2 receptor antagonist. We conducted a post hoc analysis of icatibant reinjection for HAE type I and II attacks in a real-world setting by using data from the Icatibant Outcome Survey, an ongoing observational study that monitors the safety and effectiveness of icatibant treatment. Descriptive retrospective analyses of icatibant reinjection were performed on Icatibant Outcome Survey data (February 2008 to December 2012). New attacks were defined as the onset of new symptoms after full resolution of the previous attack. Potential associations between the patient and attack characteristics and reinjection were explored by using logistic regression analysis. Icatibant was administered for 652 attacks in 170 patients with HAE type I or II. Most attacks (89.1%) were treated with a single icatibant injection. For attacks that required two or three injections, the second injection was given a median of 11.0 hours after the first injection, with 90.4% of second injections administered ≥6 hours after the first injection. Time to resolution and attack duration were significantly longer for two or three injections versus one icatibant injection (p < 0.0001 and p < 0.05, respectively). Multivariate logistic regression analysis identified sex, attack severity, and laryngeal attacks as significantly correlated with reinjection (all p ≤ 0.05). These factors did not remain predictors for reinjection when two outlier patients with distinct patterns of icatibant use were excluded. In this real-world setting, most HAE attacks resolved with one icatibant injection. There was no distinct profile for patients or attacks that required reinjection when outliers with substantially different patterns of use were excluded. Because new attacks were not distinguished from the recurrence of symptoms, reinjection rates may be slightly higher than shown here. Clinical trial identifier: NCT01034969.

  8. Buffet induced structural/flight-control system interaction of the X-29A aircraft

    NASA Technical Reports Server (NTRS)

    Voracek, David F.; Clarke, Robert

    1991-01-01

    High angle-of-attack flight regime research is currently being conducted for modern fighter aircraft at the NASA Ames Research Center's Dryden Flight Research Facility. This flight regime provides enhanced maneuverability to fighter pilots in combat situations. Flight research data are being acquired to compare and validate advanced computational fluid dynamic solutions and wind-tunnel models. High angle-of-attack flight creates unique aerodynamic phenomena including wing rock and buffet on the airframe. These phenomena increase the level of excitation of the structural modes, especially on the vertical and horizontal stabilizers. With high gain digital flight-control systems, this structural response may result in an aeroservoelastic interaction. A structural interaction on the X-29A aircraft was observed during high angle-of-attack flight testing. The roll and yaw rate gyros sensed the aircraft's structural modes at 11, 13, and 16 Hz. The rate gyro output signals were then amplified through the flight-control laws and sent as commands to the flaperons and rudder. The flight data indicated that as the angle of attack increased, the amplitude of the buffet on the vertical stabilizer increased, which resulted in more excitation to the structural modes. The flight-control system sensors and command signals showed this increase in modal power at the structural frequencies up to a 30 degree angle-of-attack. Beyond a 30 degree angle-of-attack, the vertical stabilizer response, the feedback sensor amplitude, and control surface command signal amplitude remained relatively constant. Data are presented that show the increased modal power in the aircraft structural accelerometers, the feedback sensors, and the command signals as a function of angle of attack. This structural interaction is traced from the aerodynamic buffet to the flight-control surfaces.

  9. Attack-Resistant Trust Metrics

    NASA Astrophysics Data System (ADS)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  10. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept

    NASA Astrophysics Data System (ADS)

    Carcano, Andrea; Fovino, Igor Nai; Masera, Marcelo; Trombetta, Alberto

    We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet basis, interfere with the correct behavior of the system. The proposed IDS detects such attacks thanks to an internal representation of the controlled SCADA system and a corresponding rule language, powerful enough to express the system's critical states. Furthermore, we detail the implementation and provide experimental comparative results.

  11. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Letchford, Joshua

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  12. Optimal Resource Allocation in Electrical Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yao, Y; Edmunds, T; Papageorgiou, D

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less

  13. Epileptic negative drop attacks in atypical benign partial epilepsy: a neurophysiological study.

    PubMed

    Hirano, Yoshiko; Oguni, Hirokazu; Osawa, Makiko

    2009-03-01

    We conducted a computer-assisted polygraphic analysis of drop attacks in a child with atypical benign partial epilepsy (ABPE) to investigate neurophysiological characteristics. The patient was a six-year two-month-old girl, who had started to have focal motor seizures, later combined with daily epileptic negative myoclonus (ENM) and drop attacks, causing multiple injuries. We studied episodes of ENM and drop attacks using video-polygraphic and computer-assisted back-averaging analysis. A total of 12 ENM episodes, seven involving the left arm (ENMlt) and five involving both arms (ENMbil), and five drop attacks were captured for analysis. All episodes were time-locked to spike-and-wave complexes (SWC) arising from both centro-temporo-parietal (CTP) areas. The latency between the onset of SWC and ENMlt, ENMbil, and drop attacks reached 68 ms, 42 ms, and 8 ms, respectively. The height of the spike as well as the slow-wave component of SWC for drop attacks were significantly larger than that for both ENMlt and ENMbil (p < 0.05). Drop attacks were considered to be epileptic negative myoclonus involving not only upper proximal but also axial muscles, causing the body to fall. Thus, drop attacks in ABPE are considered to be epileptic negative drop attacks arising from bilateral CTP foci and differ from drop attacks of a generalized origin seen in Lennox-Gastaut syndrome and myoclonic-astatic epilepsy.

  14. Wall-temperature effects on the aerodynamics of a hydrogen-fueled transport concept in Mach 8 blowdown and shock tunnels

    NASA Technical Reports Server (NTRS)

    Penland, J. A.; Marcum, D. C., Jr.; Stack, S. H.

    1983-01-01

    Results are presented from two separate tests on the same blended wing-body hydrogen fueled transport model at a Mach number of about 8 and a range of Reynolds numbers (based on theoretical body length) of 0.597 x 10 to the 6th power to about 156.22 x 10 to the 6th power. Tests were made in conventional hypersonic blowdown tunnel and a hypersonic shock tunnel at angles of attack of -2 deg to about 8 deg, with an extensive study made at a constant angle of attack of 3 deg. The model boundary-layer flow varied from laminar at the lower Reynolds numbers to predominantly turbulent at the higher Reynolds numbers. Model wall temperatures and stream static temperatures varied widely between the two tests, particularly at the lower Reynolds numbers. These temperature differences resulted in marked variations of the axial-force coefficients between the two tests, due in part to the effects of induced pressure and viscous interaction variations. The normal-force coefficient was essentially independent of Reynolds number. Analysis of results utilized current theoretical computer programs and basic boundary-layer theory.

  15. Stealthy false data injection attacks using matrix recovery and independent component analysis in smart grid

    NASA Astrophysics Data System (ADS)

    JiWei, Tian; BuHong, Wang; FuTe, Shang; Shuaiqi, Liu

    2017-05-01

    Exact state estimation is vital important to maintain common operations of smart grids. Existing researches demonstrate that state estimation output could be compromised by malicious attacks. However, to construct the attack vectors, a usual presumption in most works is that the attacker has perfect information regarding the topology and so on even such information is difficult to acquire in practice. Recent research shows that Independent Component Analysis (ICA) can be used for inferring topology information which can be used to originate undetectable attacks and even to alter the price of electricity for the profits of attackers. However, we found that the above ICA-based blind attack tactics is merely feasible in the environment with Gaussian noises. If there are outliers (device malfunction and communication errors), the Bad Data Detector will easily detect the attack. Hence, we propose a robust ICA based blind attack strategy that one can use matrix recovery to circumvent the outlier problem and construct stealthy attack vectors. The proposed attack strategies are tested with IEEE representative 14-bus system. Simulations verify the feasibility of the proposed method.

  16. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  17. Self-reported stroke symptoms without a prior diagnosis of stroke or transient ischemic attack: a powerful new risk factor for stroke.

    PubMed

    Kleindorfer, Dawn; Judd, Suzanne; Howard, Virginia J; McClure, Leslie; Safford, Monika M; Cushman, Mary; Rhodes, David; Howard, George

    2011-11-01

    Previously in the REasons for Geographic And Racial Differences in Stroke (REGARDS) cohort, we found 18% of the stroke/transient ischemic attack-free study population reported ≥1 stroke symptom at baseline. We sought to evaluate the additional impact of these stroke symptoms on risk for subsequent stroke. REGARDS recruited 30,239 US blacks and whites, aged 45+ years in 2003 to 2007 who are being followed every 6 months for events. All stroke events are physician-verified; those with prior diagnosed stroke or transient ischemic attack are excluded from this analysis. At baseline, participants were asked 6 questions regarding stroke symptoms. Measured stroke risk factors were components of the Framingham Stroke Risk Score. After excluding those with prior stroke or missing data, there were 24,412 participants in this analysis with a median follow-up of 4.4 years. Participants were 39% black, 55% female, and had median age of 64 years. There were 381 physician-verified stroke events. The Framingham Stroke Risk Score explained 72.0% of stroke risk; individual components explained between 0.2% (left ventricular hypertrophy) and 5.7% (age+race) of stroke risk. After adjustment for Framingham Stroke Risk Score factors, stroke symptoms were significantly related to stroke risk: for each stroke symptom reported, the risk of stroke increased by 21% per symptom. Among participants without self-reported stroke or transient ischemic attack, prior stroke symptoms are highly predictive of future stroke events. Compared with Framingham Stroke Risk Score factors, the impact of stroke symptom on the prediction of future stroke was almost as large as the impact of smoking and hypertension and larger than the impact of diabetes and heart disease.

  18. Off-design temperature effects on nuclear fuel pins for an advanced space-power-reactor concept

    NASA Technical Reports Server (NTRS)

    Bowles, K. J.

    1974-01-01

    An exploratory out-of-reactor investigation was made of the effects of short-time temperature excursions above the nominal operating temperature of 990 C on the compatibility of advanced nuclear space-power reactor fuel pin materials. This information is required for formulating a reliable reactor safety analysis and designing an emergency core cooling system. Simulated uranium mononitride (UN) fuel pins, clad with tungsten-lined T-111 (Ta-8W-2Hf) showed no compatibility problems after heating for 8 hours at 2400 C. At 2520 C and above, reactions occurred in 1 hour or less. Under these conditions free uranium formed, redistributed, and attacked the cladding.

  19. Wind-Tunnel Investigation at Low Speed of the Pitching Stability Derivatives of a 1/9-Scale Powered Model of the Convair XFY-1 Vertically Rising Airplane, TED No. NACA DE 373

    NASA Technical Reports Server (NTRS)

    Queijo, M. J.; Wolhart, Walter D.; Fletcher, H. S.

    1953-01-01

    An experimental investigation has been conducted in the Langley stability tunnel at low speed to determine the pitching stability derivatives of a 1/9-scale powered model of the Convair XFY-1 vertically rising airplane. Effects of thrust coefficient, control deflections, and propeller blade angle were investigated. The tests were made through an angle-of-attack range from about -4deg to 29deg, and the thrust coefficient range was from 0 to 0.7. In order to expedite distribution of these data, no analysis of the data has been prepared for this paper.

  20. Advances in SCA and RF-DNA Fingerprinting Through Enhanced Linear Regression Attacks and Application of Random Forest Classifiers

    DTIC Science & Technology

    2014-09-18

    Converter AES Advance Encryption Standard ANN Artificial Neural Network APS Application Support AUC Area Under the Curve CPA Correlation Power Analysis ...Importance WGN White Gaussian Noise WPAN Wireless Personal Area Networks XEnv Cross-Environment XRx Cross-Receiver xxi ADVANCES IN SCA AND RF-DNA...based tool called KillerBee was released in 2009 that increases the exposure of ZigBee and other IEEE 802.15.4-based Wireless Personal Area Networks

  1. The Icatibant Outcome Survey: treatment of laryngeal angioedema attacks

    PubMed Central

    Aberer, Werner; Bouillet, Laurence; Caballero, Teresa; Maurer, Marcus; Fabien, Vincent; Zanichelli, Andrea

    2016-01-01

    Objective To characterize the management and outcomes of life-threatening laryngeal attacks of hereditary angioedema (HAE) treated with icatibant in the observational Icatibant Outcome Survey (NCT01034969) registry. Methods This retrospective analysis was based on data from patients with HAE type I/II who received healthcare professional-administered or self-administered icatibant to treat laryngeal attacks between September 2008 and May 2013. Results Twenty centers in seven countries contributed data. Overall, 42 patients with HAE experienced 67 icatibant-treated laryngeal attacks. Icatibant was self-administered for 62.3% of attacks (healthcare professional-administered, 37.7%). One icatibant injection was used for 87.9% of attacks, with rescue or concomitant medication used for 9.0%. The median time to treatment was 2.0 h (n=31 attacks) and the median time to resolution was 6.0 h (n=35 attacks). Conclusions This analysis describes successful use of icatibant for the treatment of laryngeal HAE attacks in a real-world setting. PMID:27116379

  2. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  3. Contesting the Politics of Culture, Rewriting the Boundaries of Inclusion: Working for Social Justice with Muslim and Arab Communities.

    ERIC Educational Resources Information Center

    Abu El-Haj, Thea R.

    2002-01-01

    Recommends that educational anthropologists publicly attack the ideological purposes to which the concept of culture has been deployed following the September 11 attacks, noting the importance of supporting schools, communities, and the media in addressing the power and politics of race and religion in contemporary social and political contexts.…

  4. Expedient Emergency Sanitation Measures

    DTIC Science & Technology

    1989-03-01

    maintaining or restoring adequate sanitation in a widespread emergency. In the event of a major earthquake or nuclear attack, sewage collection and...sanitation in a widespread emergency. In the event of a major earthquake or nuclear attack, sewage collection and treatment systems, electric power and...Handbook of Chlorination, Von Nostrand Reinhold, New York, 1972, and Appendix C. 12 chlorine disinfection. The cysts of the protozoa Entamoeba

  5. Increasing the resilience and security of the United States' power infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Happenny, Sean F.

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less

  6. [Comparative analysis of phenomenology of paroxysms of atrial fibrillation and panic attacks].

    PubMed

    San'kova, T A; Solov'eva, A D; Nedostup, A V

    2004-01-01

    To study phenomenology of attacks of atrial fibrillation (AF) and to compare it with phenomenology of panic attacks for elucidation of pathogenesis of atrial fibrillation and for elaboration of rational therapeutic intervention including those aimed at correction of psychovegetative abnormalities. Patients with nonrheumatic paroxysmal AF (n=105) and 100 patients with panic attacks (n=100). Clinical, cardiological and neurological examination, analysis of patients complaints during attacks of AF, and comparison them with diagnostic criteria for panic attack. It was found that clinical picture of attacks of AF comprised vegetative, emotional and functional neurological phenomena similar to those characteristic for panic attacks. This similarity as well as positive therapeutic effect of clonazepam allowed to propose a novel pathogenic mechanism of AF attacks. Severity of psychovegetative disorders during paroxysm of AF could be evaluated by calculation of psychovegetative iudex: Psychovegetative index should be used for detection of panic attack-like component in clinical picture of AF paroxysm and thus for determination of indications for inclusion of vegetotropic drugs, e. g. clonazepam, in complex preventive therapy.

  7. Security Assessment of Cyberphysical Digital Microfluidic Biochips.

    PubMed

    Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh

    2016-01-01

    A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.

  8. Reset Tree-Based Optical Fault Detection

    PubMed Central

    Lee, Dong-Geon; Choi, Dooho; Seo, Jungtaek; Kim, Howon

    2013-01-01

    In this paper, we present a new reset tree-based scheme to protect cryptographic hardware against optical fault injection attacks. As one of the most powerful invasive attacks on cryptographic hardware, optical fault attacks cause semiconductors to misbehave by injecting high-energy light into a decapped integrated circuit. The contaminated result from the affected chip is then used to reveal secret information, such as a key, from the cryptographic hardware. Since the advent of such attacks, various countermeasures have been proposed. Although most of these countermeasures are strong, there is still the possibility of attack. In this paper, we present a novel optical fault detection scheme that utilizes the buffers on a circuit's reset signal tree as a fault detection sensor. To evaluate our proposal, we model radiation-induced currents into circuit components and perform a SPICE simulation. The proposed scheme is expected to be used as a supplemental security tool. PMID:23698267

  9. Effects of cruise engine location and power on interference

    NASA Technical Reports Server (NTRS)

    Bradley, D.

    1972-01-01

    Data are presented, in plotted form, of tests for determining the interference effects of space shuttle booster cruise engine location for power-on and power-off conditions. The tests were conducted in a 7 x 10 foot transonic wind tunnel; the model was a 0.015-scale space shuttle booster specially equipped for propulsion effects testing. Data were obtained over a Mach number range of 0.4 to 1.13 at angles of attack from -4 deg to 20 deg at zero degrees sideslip and at angles of sideslip from -6 deg to +6 deg at constant angles of attack of 0 deg, 6 deg, 15 deg, and in some cases 10 deg. Additional parameters investigated were: elevon deflection, canard deflection, aileron deflection, rudder deflection, canard position, and mass flow rate.

  10. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  11. Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures

    DTIC Science & Technology

    2015-09-01

    soundness or completeness. An incomplete analysis will produce extra edges in the CFG that might allow an attacker to slip through. An unsound analysis...Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures by Isaac Noah Evans Submitted to the Department of Electrical...Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer

  12. Home and Clinical Cardiovascular Care Center (H4C): a Framework for Integrating Body Sensor Networks and QTRU Cryptography System.

    PubMed

    Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud

    2013-01-01

    Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner.

  13. Hospital mergers and acquisitions: does market consolidation harm patients?

    PubMed

    Ho, V; Hamilton, B H

    2000-09-01

    Debate continues on whether consolidation in health care markets enhances efficiency or instead facilitates market power, possibly damaging quality. We compare the quality of hospital care before and after mergers and acquisitions in California between 1992 and 1995. We analyze inpatient mortality for heart attack and stroke patients, 90-day readmission for heart attack patients, and discharge within 48 h for normal newborn babies. Recent mergers and acquisitions have not had a measurable impact on inpatient mortality, although the associated standard errors are large. Readmission rates and early discharge increased in some cases. The adverse consequences of increased market power on the quality of care require further substantiation.

  14. Home and Clinical Cardiovascular Care Center (H4C): a Framework for Integrating Body Sensor Networks and QTRU Cryptography System

    PubMed Central

    Zakerolhosseini, Ali; Sokouti, Massoud; Pezeshkian, Massoud

    2013-01-01

    Quick responds to heart attack patients before arriving to hospital is a very important factor. In this paper, a combined model of Body Sensor Network and Personal Digital Access using QTRU cipher algorithm in Wifi networks is presented to efficiently overcome these life threatening attacks. The algorithm for optimizing the routing paths between sensor nodes and an algorithm for reducing the power consumption are also applied for achieving the best performance by this model. This system is consumes low power and has encrypting and decrypting processes. It also has an efficient routing path in a fast manner. PMID:24252988

  15. High angle of attack control law development for a free-flight wind tunnel model using direct eigenstructure assignment

    NASA Technical Reports Server (NTRS)

    Wendel, Thomas R.; Boland, Joseph R.; Hahne, David E.

    1991-01-01

    Flight-control laws are developed for a wind-tunnel aircraft model flying at a high angle of attack by using a synthesis technique called direct eigenstructure assignment. The method employs flight guidelines and control-power constraints to develop the control laws, and gain schedules and nonlinear feedback compensation provide a framework for considering the nonlinear nature of the attack angle. Linear and nonlinear evaluations show that the control laws are effective, a conclusion that is further confirmed by a scale model used for free-flight testing.

  16. Prevention of Information Leakage by Photo-Coupling in Smart Card

    NASA Astrophysics Data System (ADS)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  17. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  18. Robust Structural Analysis and Design of Distributed Control Systems to Prevent Zero Dynamics Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weerakkody, Sean; Liu, Xiaofei; Sinopoli, Bruno

    We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochasticmore » systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.« less

  19. Predicting the remaining service life of concrete

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Clifton, J.F.

    1991-11-01

    Nuclear power plants are providing, currently, about 17 percent of the U.S. electricity and many of these plants are approaching their licensed life of 40 years. The U.S. Nuclear Regulatory Commission and the Department of Energy`s Oak Ridge National Laboratory are carrying out a program to develop a methodology for assessing the remaining safe-life of the concrete components and structures in nuclear power plants. This program has the overall objective of identifying potential structural safety issues, as well as acceptance criteria, for use in evaluations of nuclear power plants for continued service. The National Institute of Standards and Technology (NIST)more » is contributing to this program by identifying and analyzing methods for predicting the remaining life of in-service concrete materials. This report examines the basis for predicting the remaining service lives of concrete materials of nuclear power facilities. Methods for predicting the service life of new and in-service concrete materials are analyzed. These methods include (1) estimates based on experience, (2) comparison of performance, (3) accelerated testing, (4) stochastic methods, and (5) mathematical modeling. New approaches for predicting the remaining service lives of concrete materials are proposed and recommendations for their further development given. Degradation processes are discussed based on considerations of their mechanisms, likelihood of occurrence, manifestations, and detection. They include corrosion, sulfate attack, alkali-aggregate reactions, frost attack, leaching, radiation, salt crystallization, and microbiological attack.« less

  20. Is There Anybody There? A Psychodynamic View of Panic Attack.

    ERIC Educational Resources Information Center

    Rizq, Rosemary

    2002-01-01

    Presents a process analysis of a psychodynamic intervention for a client with panic attacks. Discusses how a psychodynamic understanding of the complex etiology of the client's panic attacks that ultimately produced improved coping skills and a subjective sense of improvement for her. Process analysis is used to illustrate the theoretical base,…

  1. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  2. Insecurity of Wireless Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less

  3. Business interruption impacts of a terrorist attack on the electric power system of Los Angeles: customer resilience to a total blackout.

    PubMed

    Rose, Adam; Oladosu, Gbadebo; Liao, Shu-Yi

    2007-06-01

    Regional economies are highly dependent on electricity, thus making their power supply systems attractive terrorist targets. We estimate the largest category of economic losses from electricity outages-business interruption-in the context of a total blackout of electricity in Los Angeles. We advance the state of the art in the estimation of the two factors that strongly influence the losses: indirect effects and resilience. The results indicate that indirect effects in the context of general equilibrium analysis are moderate in size. The stronger factor, and one that pushes in the opposite direction, is resilience. Our analysis indicates that electricity customers have the ability to mute the potential shock to their business operations by as much as 86%. Moreover, market resilience lowers the losses, in part through the dampening of general equilibrium effects.

  4. An analysis of influenza outbreaks in institutions and enclosed societies.

    PubMed

    Finnie, T J R; Copley, V R; Hall, I M; Leach, S

    2014-01-01

    This paper considers the reported attack ratio arising from outbreaks of influenza in enclosed societies. These societies are isolated from the wider community and have greater opportunities for contact between members which would aid the spread of disease. While the particular kind of society (prison, care home, school, barracks, etc.) was not a significant factor in an adjusted model of attack ratio, a person's occupation within the society was. In particular, children and military personnel suffer a greater attack ratio than other occupational types (staff, prisoners, etc.). There was no temporal trend in final attack ratio nor, with the exception of 1918, do pandemic years show abnormal attack ratios. We also observed that as community size increases, the attack ratio undergoes steep nonlinear decline. This statistical analysis draws attention to how the organization of such societies, their size and the occupations of individuals within them affect the final attack ratio.

  5. The influence of weather on migraine – are migraine attacks predictable?

    PubMed Central

    Hoffmann, Jan; Schirra, Tonio; Lo, Hendra; Neeb, Lars; Reuter, Uwe; Martus, Peter

    2015-01-01

    Objective The study aimed at elucidating a potential correlation between specific meteorological variables and the prevalence and intensity of migraine attacks as well as exploring a potential individual predictability of a migraine attack based on meteorological variables and their changes. Methods Attack prevalence and intensity of 100 migraineurs were correlated with atmospheric pressure, relative air humidity, and ambient temperature in 4-h intervals over 12 consecutive months. For each correlation, meteorological parameters at the time of the migraine attack as well as their variation within the preceding 24 h were analyzed. For migraineurs showing a positive correlation, logistic regression analysis was used to assess the predictability of a migraine attack based on meteorological information. Results In a subgroup of migraineurs, a significant weather sensitivity could be observed. In contrast, pooled analysis of all patients did not reveal a significant association. An individual prediction of a migraine attack based on meteorological data was not possible, mainly as a result of the small prevalence of attacks. Interpretation The results suggest that only a subgroup of migraineurs is sensitive to specific weather conditions. Our findings may provide an explanation as to why previous studies, which commonly rely on a pooled analysis, show inconclusive results. The lack of individual attack predictability indicates that the use of preventive measures based on meteorological conditions is not feasible. PMID:25642431

  6. Defender-Attacker Decision Tree Analysis to Combat Terrorism.

    PubMed

    Garcia, Ryan J B; von Winterfeldt, Detlof

    2016-12-01

    We propose a methodology, called defender-attacker decision tree analysis, to evaluate defensive actions against terrorist attacks in a dynamic and hostile environment. Like most game-theoretic formulations of this problem, we assume that the defenders act rationally by maximizing their expected utility or minimizing their expected costs. However, we do not assume that attackers maximize their expected utilities. Instead, we encode the defender's limited knowledge about the attacker's motivations and capabilities as a conditional probability distribution over the attacker's decisions. We apply this methodology to the problem of defending against possible terrorist attacks on commercial airplanes, using one of three weapons: infrared-guided MANPADS (man-portable air defense systems), laser-guided MANPADS, or visually targeted RPGs (rocket propelled grenades). We also evaluate three countermeasures against these weapons: DIRCMs (directional infrared countermeasures), perimeter control around the airport, and hardening airplanes. The model includes deterrence effects, the effectiveness of the countermeasures, and the substitution of weapons and targets once a specific countermeasure is selected. It also includes a second stage of defensive decisions after an attack occurs. Key findings are: (1) due to the high cost of the countermeasures, not implementing countermeasures is the preferred defensive alternative for a large range of parameters; (2) if the probability of an attack and the associated consequences are large, a combination of DIRCMs and ground perimeter control are preferred over any single countermeasure. © 2016 Society for Risk Analysis.

  7. An Active Smart Material Control System for F/A-18 Buffet Alleviation

    NASA Technical Reports Server (NTRS)

    Sheta, Essam F.; Moses, Robert W.; Huttsell, Lawrence J.; Harrand, Vincent J.

    2003-01-01

    The vertical tail buffet problem of fighter aircraft occurs at high angles of attack when the vortical flow breaks down ahead of the vertical tails resulting in unsteady and unbalanced pressure loads on the vertical tails. The buffet loads imposed upon the vertical tails resulted in a premature fatigue failure of the tails, and consequently limits the performance and super maneuverability of twin-tail fighter aircraft. An active smart material control system using distributed piezoelectric actuators has been developed for buffet alleviation and is presented. The inboard and outboard surfaces of the vertical tail are equipped with piezoelectric actuators to control the buffet responses in the first bending and torsion modes. The electrodynamics of the piezoelectric actuators are expressed with a three-dimensional finite-element model. A single-input-single-output controller is designed to drive the active piezoelectric actuators. High-fidelity multidisciplinary analysis modules for the fluid dynamics, structure dynamics, electrodynamics of the piezoelectric actuators, control law, fluid structure interfacing, and grid motion are integrated into a multidisciplinary computing environment that controls the temporal synchronization of the analysis modules. At 30 degree angle of attack, RMS values of tip acceleration are reduced by as much as 12%. The peak values of the power spectral density of tail-tip acceleration are reduced by as much as 22% in the first bending mode and by as much as 82% in the first torsion mode. The actively controlled piezoelectric actuators were also effective in adding damping at wide range of angles of attack.

  8. Collaborative Defense of Transmission and Distribution Protection and Control Devices Against Cyber Attacks (CODEF) DE-OE0000674. ABB Inc. Final Scientific/Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nuqui, Reynaldo

    This report summarizes the activities conducted under the DOE-OE funded project DEOE0000674, where ABB Inc. (ABB), in collaboration with University of Illinois at Urbana-Champaign (UIUC), Bonneville Power Administration (BPA), and Ameren-Illinois (Ameren-IL) pursued the development of a system of collaborative defense of electrical substation’s intelligent electronic devices against cyber-attacks (CODEF). An electrical substation with CODEF features will be more capable of mitigating cyber-attacks especially those that seek to control switching devices. It leverages the security extensions of IEC 61850 to empower existing devices to collaborate in identifying and blocking malicious intents to trip circuit breakers, mis-coordinate devices settings, even thoughmore » the commands and the measurements comply with correct syntax. The CODEF functions utilize the physics of electromagnetic systems, electric power engineering principles, and computer science to bring more in depth cyber defense closer to the protected substation devices.« less

  9. Industrial Control Systems/SCADA systems risk assessment in the energy sector

    NASA Astrophysics Data System (ADS)

    Falodun, Babatunde

    The energy sector is one of the most critical components of our national infrastructure. It not only provides the electrical power and petroleum required to run day-to-day operations and mechanisms in society, it's also an important element that directly impacts the economy with regard to growth and stability. Industrial Control Systems (ICS) /Supervisory Control and Data Acquisition Systems (SCADA) are computerized mechanisms, they are both software and hardware that are used to control real time processes and operations in power plants and oil production facilities. A significant attack on these control systems that leads to widespread disruption of energy could result in catastrophic consequences for any major city and even the nation. This research paper explores cyber threats and vulnerabilities faced by ICS/SCADA systems in the energy sector and also highlights possible outcomes of a successful breach. Furthermore, the research underscores mitigation strategies that could be used to prevent and respond to an attack. Keywords: Cybersecurity, SCADA, Cyber Attacks, Threats, Vulnerabilities, Risk Assessment, Dr. Albert Orbinati.

  10. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less

  11. Noise of the SR-6 propeller model at 2 deg and 4 deg angles of attack

    NASA Technical Reports Server (NTRS)

    Dittmar, J. H.; Stefko, G. L.

    1983-01-01

    The noise generated by supersonic-tip-speed propellers creates a cabin noise problem for future airplanes powered by these propellers. Noise of a number of propeller models were measured in the NASA Lewis 8- by 6-Foot Wind Tunnel with flow parallel to the propeller axis. In flight, as a result of the induced upwash from the airplane wing, the propeller is at an angle of attack with respect to the incoming flow. Therefore, the 10-blade SR-6 propeller was operated at angle of attack to determine its noise behavior. Higher blade passage tones were observed for the propeller operating at angle of attack in a 0.6 axial Mach number flow. The noise increase was not symmetrical, with one wall of the wind tunnel showing a larger noise increase than the other wall. No noise increase was observed at angle of attack in a 0.8 axial Mach number flow. For this propeller the dominance of thickness noise, which does not increase with angle of attack, explains the lack of noise increase at the higher 0.8 Mach number.

  12. Irregular Warfare Stability Model (IWSMod)

    DTIC Science & Technology

    2014-01-01

    single shot causing no casualties to a highly coordinated complex attack using two or more weapon systems. Advances in technology have allowed...to power law, the more stable the enviroment . To determine how close the actual distribution is to the power law, the method determines the

  13. Risk factors for hypertensive attack during pheochromocytoma resection

    PubMed Central

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  14. Automatic Inference of Cryptographic Key Length Based on Analysis of Proof Tightness

    DTIC Science & Technology

    2016-06-01

    within an attack tree structure, then expand attack tree methodology to include cryptographic reductions. We then provide the algorithms for...maintaining and automatically reasoning about these expanded attack trees . We provide a software tool that utilizes machine-readable proof and attack metadata...and the attack tree methodology to provide rapid and precise answers regarding security parameters and effective security. This eliminates the need

  15. Assessment of aerodynamic performance of V/STOL and STOVL fighter aircraft

    NASA Technical Reports Server (NTRS)

    Nelms, W. P.

    1984-01-01

    The aerodynamic performance of V/STOL and STOVL fighter/attack aircraft was assessed. Aerodynamic and propulsion/airframe integration activities are described and small and large scale research programs are considered. Uncertainties affecting aerodynamic performance that are associated with special configuration features resulting from the V/STOL requirement are addressed. Example uncertainties relate to minimum drag, wave drag, high angle of attack characteristics, and power induced effects.

  16. Recommended E3 HEMP Heave Electric Field Waveform for the Critical Infrastructures. Volume 2

    DTIC Science & Technology

    2017-07-31

    OF THE COMMISSION TO ASSESS THE THREAT TO THE UNITED STATES FROM ELECTROMAGNETIC PULSE (EMP) ATTACK The cover photo depicts Fishbowl Starfish...Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack. The Commission was established by Congress in the FY2001 National...Department of Defense E electric field EMP electromagnetic pulse EPRI Electric Power Research Institute FERC Federal Energy Regulatory Commission GMD

  17. Summary of low-speed longitudinal aerodynamics of two powered close-coupled wing-canard fighter configurations. [conducted in Langley C/STOL tunnel

    NASA Technical Reports Server (NTRS)

    Paulson, J. W., Jr.; Thomas, J. L.

    1979-01-01

    Investigations of the low speed longitudinal characteristics of two powered close coupled wing-canard fighter configurations are discussed. Data obtained at angles of attack from -2 deg to 42 deg, Mach numbers from 0.12 to 0.20, nozzle and flap deflections from 0 deg to 40 deg, and thrust coefficients from 0 to 2.0, to represent both high angle of attack subsonic maneuvering characteristics and conventional takeoff and landing characteristics are examined. Data obtained with the nozzles deflected either 60 deg or 90 deg and the flaps deflected 60 deg to represent vertical or short takeoff and landing characteristics are discussed.

  18. Robust shot-noise measurement for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Kunz-Jacques, Sébastien; Jouguet, Paul

    2015-02-01

    We study a practical method to measure the shot noise in real time in continuous-variable quantum key distribution systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e., noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.

  19. Large-scale wind tunnel tests of a sting-supported V/STOL fighter model at high angles of attack

    NASA Technical Reports Server (NTRS)

    Stoll, F.; Minter, E. A.

    1981-01-01

    A new sting model support has been developed for the NASA/Ames 40- by 80-Foot Wind Tunnel. This addition to the facility permits testing of relatively large models to large angles of attack or angles of yaw depending on model orientation. An initial test on the sting is described. This test used a 0.4-scale powered V/STOL model designed for testing at angles of attack to 90 deg and greater. A method for correcting wake blockage was developed and applied to the force and moment data. Samples of this data and results of surface-pressure measurements are presented.

  20. Collective attacks and unconditional security in continuous variable quantum key distribution.

    PubMed

    Grosshans, Frédéric

    2005-01-21

    We present here an information theoretic study of Gaussian collective attacks on the continuous variable key distribution protocols based on Gaussian modulation of coherent states. These attacks, overlooked in previous security studies, give a finite advantage to the eavesdropper in the experimentally relevant lossy channel, but are not powerful enough to reduce the range of the reverse reconciliation protocols. Secret key rates are given for the ideal case where Bob performs optimal collective measurements, as well as for the realistic cases where he performs homodyne or heterodyne measurements. We also apply the generic security proof of Christiandl et al. to obtain unconditionally secure rates for these protocols.

  1. Continuous-variable quantum cryptography is secure against non-Gaussian attacks.

    PubMed

    Grosshans, Frédéric; Cerf, Nicolas J

    2004-01-30

    A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.

  2. A multidisciplinary approach to the identification and evaluation of novel concepts for deeply buried hardened target defeat

    NASA Astrophysics Data System (ADS)

    Branscome, Ewell Caleb

    During the Cold War, Deeply Buried Hardened Targets (DBHTs) and the assets they protected were of great strategic and tactical concern to the Department of Defense. Megaton-class nuclear warheads were the only viable means of attacking many of these facilities, and even so, a small subset of DBHTs was anticipated to be robust even in the face of such an attack. Post Cold War, the threat posed by DBHTs has not disappeared. Rather, the conventional warfare advantages of the United States have led to an increasing emphasis by potential adversaries on the construction and use of hardened facilities such as DBHTs for protection of both conventional and unconventional assets. Further, the shift in perceived relative risk to the United States' national security from large scale all-out nuclear attack towards very limited attack by Weapons of Mass Destruction (WMD) has led some to hypothesize that "self-deterrence" may diminish the strategic value of current inventory nuclear weapons. The objective of the work described was to identify and explore a paradigm shifting solution that could offer leap-ahead capabilities to counter current and future DBHT threats while mitigating or eliminating the "self-deterrence" issue. Systematic evaluation of DHBT defeat alternatives lead to the selection of a thermal subterrene as a hypothetical means of providing such a capability. A number of possible implementation alternatives for a thermal subterrene were investigated, resulting in the identification of the RadioIsotope Powered Thermal Penetrator (RIPTP) concept for providing an effectively unlimited hard rock penetration capability using near-term technologies. However, the proposed approach was novel and thus required formulation and application of a physics based multidisciplinary analysis code to enable evaluation of lv design alternatives and analysis of performance. Technical considerations identified as important to the feasibility of a RIPTP for DBHT defeat included: packing of RIPTP components in available volume; close-contact melting in a medium with nonlinear thermodynamic properties; radiation shielding; radiation health physics; point source plume dispersal calculations; alternative technologies for production of radioisotopes; chemical and physical properties of isotope compounds; nuclear reactor characteristics; high temperature material stability and inter-material compatibility; weapon and delivery system integration; a variety of heat transfer regimes including radiation, conduction, convection, nucleate boiling, and film boiling; thermal/mechanical stress analysis (steady-state and transient); rock physical and thermodynamic properties as a function of temperature; detection/mapping of deeply buried facility spaces; and more. The following disciplinary analyses were composed into a multidisciplinary analysis code for a RIPTP: packing of RIPTP components in available volume; close-contact melting analysis; transmutation of isotope species by neutron activation; reactor neutron economy; radioisotope power generation through decay; metamodelled radiation shielding calculations for a RIPTP; and steady state thermal analyses for a RIPTP in various scenarios. Filtering of radioisotopes for potential suitability, their possible production mechanisms, state of technological development, and multidisciplinary analysis code predicted performance lead to the identification of Thulium-170 as the best isotope for powering a RIPTP using present-day technology and technical data. Ytterbium-169 was identified as an alternative isotope offering the potential for significant potential improvements over Thulium-170 in radiological safety as well as RIPTP performance and producibility. Production, however, was determined to require identification of a cost effective technology for highly enriching Ytterbium-168 from its low natural abundance. Performance analysis of the identified baseline Thulium-170 RIPTP suggested that the predicted low penetration rate of about 10 meters/day could be a significant negative factor with regards to possible viability of the concept. Consequently, a survey for potentially enabling technologies was performed using an adaptation of the Technology Impact Forecasting (TIF) approach. It was found that the greatest potential for improving performance of the baseline Thulium-170 RIPTP resulted from increasing overall power density of the penetrator. Several possible technology approaches to achieving significantly increased penetration rates (approximately 50 meters/day expected penetration rate vs. original 13 meters/day) were proposed. However, it was determined that the hypothetical technology having the greatest potential impact on thermal subterrene viability for DHBT defeat with respect to penetration rate was cost-effective enrichment for Ytterbium-168. Development of such a technology would eliminate or enormously reduce the impact of all identified RIPTP performance and producibility concerns. Alternatively, relaxation of the requirement for no radiological hazard to enemy combatants would enable selection of a fissile powered thermal subterrene to provide required power densities consistent with rapid penetration.

  3. Aerospace Doctrine Matures Through a Storm: An Analysis of the New AFM 1-1

    DTIC Science & Technology

    1993-01-01

    Dilemma,� Air Power Doctrine, edited by Group Captain A.G.B. Vallance . (London: Her Majesty’s Stationary Office, 1990), pp. 58 - 75Here he states how...used in Irak (sic). Ibid., p. 54See also Richard Hallion, Strike From the Sky: The History of Battlefield Air Attack. 1911_-_1945 (Washington D.C...Craven and Cate, Army Air Forces, Vol 2, p. 321. 64 Hansell, Strategic Air War, p. 83. 65 See Richard H. Kohn and Joseph P. Harahan, General Editors

  4. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    NASA Astrophysics Data System (ADS)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of packet-drops and finally detect attacks, if any. In the case of PMU data manipulation attacks, the attacker may modify the data in the PMU packets in order to bias the system states and influence the control center into taking wrong decisions. The proposed detection technique is based on evaluating the equivalent impedances of the transmission lines and classifying the observed anomalies to determine the presence of attack and its location. The scheme for detecting data integrity attacks on SCADA systems is based on utilizing synchrophasor measurements from available PMUs in the grid. The proposed method uses a difference measure, developed in this thesis, to determine the relative divergence and mis-correlation between the datasets. Based on the estimated difference measure, tampered and genuine data can be distinguished. The proposed detection mechanisms have demonstrated high accuracy in real-time detection of attacks of various magnitudes, simulated on real PMU data obtained from the NY grid. By performing alarm clustering, the occurrence of false alarms has been reduced to almost zero. The solutions are computationally inexpensive, low on cost, do not add any overhead, and do not require any feedback from the network.

  5. Differential Canard deflection for generation of yawing moment on the X-31 with and without the vertical tail. M.S. Thesis - George Washington Univ.

    NASA Technical Reports Server (NTRS)

    Whiting, Matthew Robert

    1996-01-01

    The feasibility of augmenting the available yaw control power on the X-31 through differential deflection of the canard surfaces was studied as well as the possibility of using differential canard control to stabilize the X-31 with its vertical tail removed. Wind-tunnel tests and the results of departure criteria and linear analysis showed the destabilizing effect of the reduction of the vertical tail on the X-31. Wind-tunnel testing also showed that differential canard deflection was capable of generating yawing moments of roughly the same magnitude as the thrust vectoring vanes currently in place on the X-31 in the post-stall regime. Analysis showed that the X-31 has sufficient aileron roll control power that with the addition of differential canard as a yaw controller, the wind-axis roll accelerations will remain limited by yaw control authority. It was demonstrated, however, that pitch authority may actually limit the maximum roll rate which can be sustained. A drop model flight test demonstrated that coordinated, wind axis rolls could be performed with roll rates as high as 50 deg/sec (full scale equivalent) at 50 deg angle of attack. Another drop model test was conducted to assess the effect of vertical tail reduction, and an analysis of using differential canard deflection to stabilize the tailless X-31 was performed. The results of six-degree-of-freedom, non-linear simulation tests were correlated with the drop model flights. Simulation studies then showed that the tailless X-31 could be controlled at angles of attack at or above 20 deg using differential canard as the only yaw controller.

  6. Uninterruptible Power Systems: Operational and Cost Considerations.

    DTIC Science & Technology

    1977-03-01

    functions are degraded by power line disturbances to an extent that some type of power conditioning equipment is warranted. Possibly, the management policy...disasters, or attack; i.e., at exactly the times when commercial power utility service is most likely to be disrupted or degraded . In the past... degradation of readiness in emergencies are more pertinent criteria, but unfortunately are not readily comparable to the cost of equipment required

  7. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  8. Subsonic balance and pressure investigation of a 60 deg delta wing with leading edge devices

    NASA Technical Reports Server (NTRS)

    Tingas, S. A.; Rao, D. M.

    1982-01-01

    Low supersonic wave drag makes the thin highly swept delta wing the logical choice for use on aircraft designed for supersonic cruise. However, the high-lift maneuver capability of the aircraft is limited by severe induced-drag penalties attributed to loss of potential flow leading-edge suction. This drag increase may be alleviated through leading-edge flow control to recover lost aerodynamic thrust through either retention of attached leading-edge flow to higher angles of attack or exploitation of the increased suction potential of separation-induced vortex flow. A low-speed wind-tunnel investigation was undertaken to examine the high-lift devices such as fences, chordwise slots, pylon vortex generators, leading-edge vortex flaps, and sharp leading-edge extensions. The devices were tested individually and in combinations in an attempt to improve high-alpha drag performance with a minimum of low-alpha drag penalty. This report presents an analysis of the force, moment, and static pressure data obtained in angles of attack up to 23 deg, at Mach and Reynolds numbers of 0.16 and 3.85 x 10 to the 6th power per meter, respectively. The results indicate that all the devices produced drag and longitudinal/lateral stability improvements at high lift with, in most cases, minor drag penalties at low angles of attack.

  9. Dopaminergic regulation of sleep and cataplexy in a murine model of narcolepsy.

    PubMed

    Burgess, Christian R; Tse, Gavin; Gillis, Lauren; Peever, John H

    2010-10-01

    To determine if the dopaminergic system modulates cataplexy, sleep attacks and sleep-wake behavior in narcoleptic mice. Hypocretin/orexin knockout (i.e., narcoleptic) and wild-type mice were administered amphetamine and specific dopamine receptor modulators to determine their effects on sleep, cataplexy and sleep attacks. Hypocretin knockout (n = 17) and wild-type mice (n = 21). Cataplexy, sleep attacks and sleep-wake behavior were identified using electroencephalogram, electromyogram and videography. These behaviors were monitored for 4 hours after an i.p. injection of saline, amphetamine and specific dopamine receptor modulators (D1- and D2-like receptor modulators). Amphetamine (2 mg/kg), which increases brain dopamine levels, decreased sleep attacks and cataplexy by 61% and 67%, suggesting that dopamine transmission modulates such behaviors. Dopamine receptor modulation also had powerful effects on sleep attacks and cataplexy. Activation (SKF 38393; 20 mg/kg) and blockade (SCH 23390; 1 mg/kg) of D1-like receptors decreased and increased sleep attacks by 77% and 88%, without affecting cataplexy. Pharmacological activation of D2-like receptors (quinpirole; 0.5 mg/kg) increased cataplectic attacks by 172% and blockade of these receptors (eticlopride; 1 mg/kg) potently suppressed them by 97%. Manipulation of D2-like receptors did not affect sleep attacks. We show that the dopaminergic system plays a role in regulating both cataplexy and sleep attacks in narcoleptic mice. We found that cataplexy is modulated by a D2-like receptor mechanism, whereas dopamine modulates sleep attacks by a D1-like receptor mechanism. These results support a role for the dopamine system in regulating sleep attacks and cataplexy in a murine model of narcolepsy.

  10. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    NASA Astrophysics Data System (ADS)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  11. Appraisal of Scientific Resources for Emergency Management.

    DTIC Science & Technology

    1983-09-01

    water, communications, computers, and oil refineries or storage facilities. In addition, the growth of the number of operative nuclear power plants ...one from a nuclear power plant accident); one involved hazardous waste disposal problems; and finally two involved wartime scenarios, one focusing on...pro- tection research, radiological protection from nuclear power plant accidents, concepts and operation of public shelters, and post attack

  12. On the IDAGAM I Combat Model.

    DTIC Science & Technology

    1977-06-01

    defense missions in locations between the FEBA and the attackers’ targets; b) AAA can attack only aircraft attacking the guns them- selves or the targets...the guns are defending; c) SAM weapon systems can attack not only aircraft attack- ing them and the targets they defend but also, although possibly...Corporation), P.E. Louer (Department of the Army) and B.R. McEnany (Joint Chiefs of Staff/Studies, Analysis and Gaming Agency) for their help- ful

  13. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  14. Automated Software Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  15. Engaging the Nation’s Critical Infrastructure Sector to Deter Cyber Threats

    DTIC Science & Technology

    2013-03-01

    is the component of CyberOps that extends cyber power beyond the defensive boundaries of the GIG to detect, deter, deny, and defeat adversaries... economy .16 DDOS attacks are based on multiple, malware infected personal computers, organized into networks called botnets, and are directed by...not condemn the actions of those involved. Of the two attacks on Estonia and Georgia, it was Estonia that had the greatest damage to its economy

  16. Soviet Non-Linear Combat: The Challenge of the 90s

    DTIC Science & Technology

    1990-09-01

    with powerful air and artillery fire strikes, will allow a combatanL to rapidly insert ground units, air-assault forces, and other specially-trained Q...dynamic and highly maneuverable, forcing subunits to change rapidly from attack to defense and back again, and to change frequently its combat formation...two. Team members rapidly coalesce into temporary attack or defensive groups and then disperse again. The Soviets see non-linear battle as one in which

  17. Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace

    DTIC Science & Technology

    2012-02-15

    instruments of power. It is an evolving landscape of electronic and kinetic threats that may merely scratch the surface of what might be at an...communications satellite; and in 2008, during two separate attacks, hackers accessed National Aeronautics and Space Administration ( NASA ) telemetry...unacceptable and to be avoided.23,24 Deterrence between the United States and the Soviet Union was bi-polar, between known adversaries. This is not

  18. Practical Guide for Emergency Crime Prevention and Penal System Alternatives in Crisis Relocation Planning.

    DTIC Science & Technology

    1982-09-01

    93117____________ 11. CONTROLLING OFFICE NAMIE AND ADDRESS 12. REPORT DATE Federal Emergency Management Agency 21 September 1982 13. NUMBER OF...relocation is the controlled , orderly evacuation of a community that is a possible target for attack by a foreign power. The concept of crisis...SI s Relocation? Crisis relocation is the controlled , orderly evacuation of a comunity which is considered a possible target for foreign attack

  19. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    PubMed

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  20. Superlinear threshold detectors in quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lydersen, Lars; Maroey, Oystein; Skaar, Johannes

    2011-09-15

    We introduce the concept of a superlinear threshold detector, a detector that has a higher probability to detect multiple photons if it receives them simultaneously rather than at separate times. Highly superlinear threshold detectors in quantum key distribution systems allow eavesdropping the full secret key without being revealed. Here, we generalize the detector control attack, and analyze how it performs against quantum key distribution systems with moderately superlinear detectors. We quantify the superlinearity in superconducting single-photon detectors based on earlier published data, and gated avalanche photodiode detectors based on our own measurements. The analysis shows that quantum key distribution systemsmore » using detector(s) of either type can be vulnerable to eavesdropping. The avalanche photodiode detector becomes superlinear toward the end of the gate. For systems expecting substantial loss, or for systems not monitoring loss, this would allow eavesdropping using trigger pulses containing less than 120 photons per pulse. Such an attack would be virtually impossible to catch with an optical power meter at the receiver entrance.« less

  1. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  2. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  3. Cyberwarfare on the Electricity Infrastructure

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Murarka, N.; Ramesh, V.C.

    2000-03-20

    The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.

  4. 77 FR 64935 - Reliability Standards for Geomagnetic Disturbances

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-24

    ... Ridge Study'') on the effects of electromagnetic pulses on the Bulk-Power System. Available at http... . \\6\\ Oak Ridge National Laboratory, Electromagnetic Pulse: Effects on the U.S. Power Grid: Meta-R-319... issued reports assessing the threat to the United States from Electromagnetic Pulse (EMP) attack in 2004...

  5. The Need for Balance in Attack Aviation Employment Against Hybrid Threats

    DTIC Science & Technology

    2014-06-13

    they mitigate airpower as well as their ability to counter landpower. Cilluffo and Clark offer a further explanation of hybrid threats. Although...power radios, and the systematic manipulation of the power grids resulting in the flickering of the lights in certain towns to alert fighters...

  6. Networking in the Presence of Adversaries

    DTIC Science & Technology

    2014-09-12

    a topological graph with linear algebraic constraints. As a practical example, such a model arises from an electric power system in which the power...flow is governed by the Kirchhoff law. When an adversary launches an MiM data attack, part of the sensor data are intercepted and substituted with

  7. Impact modeling and prediction of attacks on cyber targets

    NASA Astrophysics Data System (ADS)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  8. Sustaining U.S. Nuclear Submarine Design Capabilities

    DTIC Science & Technology

    2007-01-01

    lost learning because there is an inherent novelty to each succeeding design effort, but on the other hand, higher 2 Note there is a unique “do...Nautilus 1 1954 Attack Seawolf 1 1957 Attack Skate 4 1958–1959 Attack Skipjack 6 1959–1961 Attack Triton 1 1959 Attack George Washington 5 1960–1962...development, electric motors and controls development, or equipment acoustic analysis (listed to the right of the pyramid). All of these skills have some

  9. Topological Vulnerability Analysis

    NASA Astrophysics Data System (ADS)

    Jajodia, Sushil; Noel, Steven

    Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires a great deal of expertise, and is error prone because of the complexity of networks and associated security data. The interdependencies of network vulnerabilities make traditional point-wise vulnerability analysis inadequate. We describe a Topological Vulnerability Analysis (TVA) approach that analyzes vulnerability dependencies and shows all possible attack paths into a network. From models of the network vulnerabilities and potential attacker exploits, we compute attack graphs that convey the impact of individual and combined vulnerabilities on overall security. TVA finds potential paths of vulnerability through a network, showing exactly how attackers may penetrate a network. From this, we identify key vulnerabilities and provide strategies for protection of critical network assets.

  10. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  11. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    NASA Astrophysics Data System (ADS)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  12. Will electrical cyber-physical interdependent networks undergo first-order transition under random attacks?

    NASA Astrophysics Data System (ADS)

    Ji, Xingpei; Wang, Bo; Liu, Dichen; Dong, Zhaoyang; Chen, Guo; Zhu, Zhenshan; Zhu, Xuedong; Wang, Xunting

    2016-10-01

    Whether the realistic electrical cyber-physical interdependent networks will undergo first-order transition under random failures still remains a question. To reflect the reality of Chinese electrical cyber-physical system, the "partial one-to-one correspondence" interdependent networks model is proposed and the connectivity vulnerabilities of three realistic electrical cyber-physical interdependent networks are analyzed. The simulation results show that due to the service demands of power system the topologies of power grid and its cyber network are highly inter-similar which can effectively avoid the first-order transition. By comparing the vulnerability curves between electrical cyber-physical interdependent networks and its single-layer network, we find that complex network theory is still useful in the vulnerability analysis of electrical cyber-physical interdependent networks.

  13. Providing security for automated process control systems at hydropower engineering facilities

    NASA Astrophysics Data System (ADS)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  14. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both ofmore » these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.« less

  15. Effect of a rotating propeller on the separation angle of attack

    NASA Technical Reports Server (NTRS)

    Boldman, D. R.; Iek, C.; Hwang, D. P.; Larkin, M.; Schweiger, P.

    1993-01-01

    The present study represents an extension of an earlier wind tunnel experiment performed with the P&W 17-in. Advanced Ducted Propeller (ADP) Simulator operating at Mach 0.2. In order to study the effects of a rotating propeller on the inlet flow, data were obtained in the UTRC 10- by 15-Foot Large Subsonic Wind Tunnel with the same hardware and instrumentation, but with the propellar removed. These new tests were performed over a range of flow rates which duplicated flow rates in the powered simulator program. The flow through the inlet was provided by a remotely located vacuum source. A comparison of the results of this flow-through study with the previous data from the powered simulator indicated that in the conventional inlet the propeller produced an increase in the separation angle of attack between 4.0 deg at a specific flow of 22.4 lb/sec-sq ft to 2.7 deg at a higher specific flow of 33.8 lb/sec-sq ft. A similar effect on separation angle of attack was obtained by using stationary blockage rather than a propeller.

  16. Preliminary Results Obtained from Flight Test of a 1/7-Scale Rocket-Powered Model of the Grumman XF10F Airplane Configuration in the Swept-Wing Condition, TED No. NACA DE 354

    NASA Technical Reports Server (NTRS)

    Gardner, William N.

    1951-01-01

    A flight investigation of a 1/7-scale rocket-powered model of the XF10F Grumman XFl0F airplane in the swept-wing configuration has been made. The purpose of this test was to determine the static longitudinal stability, damping in pitch, and longitudinal control effectiveness of the airplane with the center of gravity at 20 percent of the wing mean aerodynamic chord. Only a small amount of data was obtained from the test because, immediately after booster separation at a Mach number of 0.88, the configuration was directionally unstable and diverged in sideslip. Simultaneous with the sideslip divergence, the model became longitudinally unstable at 3 degree angle of attack and -6 degree sideslip and diverged in pitch to a high angle of attack. During the pitch-up the free-floating horizontal tail became unstable at 5 degree angle of attack and the tail drifted against its positive deflection limit.

  17. Low-speed aerodynamic characteristics of a 1/8-scale X-29A airplane model at high angles of attack and sideslip

    NASA Technical Reports Server (NTRS)

    Whipple, R. D.; Ricket, J. L.

    1986-01-01

    A 1/8-scale model of the X-29A airplane was tested in the Ames 12-Foot Pressure Wind Tunnel at a Mach number of 0.20 and Reynolds numbers of 0.13 x 10 to the 6th power to 2.00 x 10 to the 6th power based on a fuselage forebody depth of 0.4 ft, For the test series presented herein, the angle of attack ranged from 40 deg. to 90 deg. and the angle of sideslip ranged from -10 deg. to 30 deg. for the erect attitude. Tests with the model inverted covered angles of attack from -40 deg. to -90 deg. and angles of sideslip from -30 deg. to 10 deg. Data were obtained for the basic design and for several forebody strakes. An alternate forebody design was also tested. The results provided information for selection of forebody strakes for compensation of Reynolds number effect on the 1/25-scale free-spinning model tested in the Langley Spin Tunnel.

  18. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    PubMed

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  19. Factors associated with recovery from acute optic neuritis in patients with multiple sclerosis.

    PubMed

    Malik, Muhammad Taimur; Healy, Brian C; Benson, Leslie A; Kivisakk, Pia; Musallam, Alexander; Weiner, Howard L; Chitnis, Tanuja

    2014-06-17

    To identify clinical and demographic features associated with the severity and recovery from acute optic neuritis (AON) episodes in patients with multiple sclerosis (MS). Adult (n = 253) and pediatric (n = 38) patients whose first symptom was AON were identified from our MS database. Severity measured by loss of visual acuity (mild attack ≤20/40, moderate attack 20/50-20/190, and severe attack ≥20/200) and recovery in visual acuity at 1 year after the attack (complete recovery ≤20/20, fair recovery 20/40, and poor recovery ≥20/50) were recorded. Demographic and clinical features associated with attack severity and recovery were identified using proportional odds logistic regression. For another group of patients, blood samples were available within 6 months of an AON attack. In this group, the impact of vitamin D level on the severity/recovery was also assessed. Men (adjusted odds ratio [OR] = 2.28, p = 0.03) and subjects with severe attacks (adjusted OR = 5.24, p < 0.001) had worse recovery. AON severity was similar between the pediatric and adult subjects, but recovery was significantly better in pediatric subjects in the unadjusted analysis (p = 0.041) and the analysis adjusted for sex (p = 0.029). Season-adjusted vitamin D level was significantly associated with attack severity (OR for 10-U increase in vitamin D level = 0.47; 95% confidence interval: 0.32, 0.68; p < 0.001). Vitamin D level was not associated with recovery from the attack (p = 0.98) in univariate analysis or after accounting for attack severity (p = 0.10). Vitamin D levels affect AON severity, whereas younger age, attack severity, and male sex affect AON recovery. Underlying mechanisms and potential therapeutic targets may identify new measures to mitigate disability accrual in MS. © 2014 American Academy of Neurology.

  20. Gen Otto P. Weyland: Close Air Support in the Korean War

    DTIC Science & Technology

    2007-03-01

    man- power nor the equipment to significantly change the nature of the struggle, American forces were left to adjust. Thomas H. Greer remembers that...defense?”19 In The Development of Air Doctrine in the Army Air Arm, 1917– 1941, Thomas Greer observes that differences in the relative importance of...exception was Capt George C. Kenney. Kenney, considered the most influential attack instructor at ACTS, wrote a textbook on attack aviation and

  1. The Effect of Adversary Unmanned Aerial Systems on the US Concept of Air Superiority

    DTIC Science & Technology

    2014-12-04

    impact on the US concept of air superiority. Politically, psychologically , and operationally, air superiority is important. UAS are capable of attack...challenge to the US concept of air superiority. Adversary drones have the potential to be a sporadic but deadly and psychologically powerful weapon that...toll they took in lives and equipment, kamikaze attacks also had a psychological impact. Dr. Alvin D. Coox, a professor of history and Asian studies

  2. Formulating a strategy for securing high-speed rail in the United States.

    DOT National Transportation Integrated Search

    2013-03-01

    This report presents an analysis of information relating to attacks, attempted attacks, and plots against high-speed rail (HSR) : systems. It draws upon empirical data from MTIs Database of Terrorist and Serious Criminal Attacks Against Public Sur...

  3. Case report of a fatal bear attack documented by forensic wildlife genetics.

    PubMed

    Frosch, Christiane; Dutsov, Aleksandar; Georgiev, Georgi; Nowak, Carsten

    2011-08-01

    Fatal bear attacks on humans are extremely rare across Europe. Here we report a fatal bear attack on a man in Bulgaria. We used microsatellite analysis for bear individualization based on hair samples found near the man's corpse. The genetic profile of the killing bear was compared to that of a bear shot three days later near the killing scene. Our results show that the wrong bear has been shot. Shortly after our results were reported a second person was attacked by a bear nearby. This case documents the importance of forensic DNA analysis following severe wildlife attacks in order to improve wildlife management actions in regions were direct human-bear conflicts are likely to happen. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  4. Moments of Goodness: An Analysis of Ethical and Educational Dimensions of the Terror Attack on Utøya, Norway (July 22, 2011)

    ERIC Educational Resources Information Center

    Kristiansen, Aslaug

    2015-01-01

    The analysis is based on some moral experiences taking place during a terrorist attack on the Norwegian Labor Party's youth camp on the island of Utøya (outside of Oslo) July 22, 2011, where 69 young people were killed and several seriously injured. After the attack many of the survivors told stories of how strangers spontaneous had helped and…

  5. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    ERIC Educational Resources Information Center

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  6. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    PubMed Central

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  7. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    PubMed

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  8. Conduct of Occupational Health During Major Disasters: A Comparison of Literature on Occupational Health Issues in the World Trade Center Terrorist Attack and the Fukushima Nuclear Power Plant Accident.

    PubMed

    Toyoda, Hiroyuki; Mori, Koji

    2017-01-01

    Workers who respond to large-scale disasters can be exposed to health hazards that do not exist in routine work. It is assumed that learning from past cases is effective for preparing for and responding to such problems, but published information is still insufficient. Accordingly, we conducted a literature review about the health issues and occupational health activities at the World Trade Center (WTC) terrorist attack and at the Fukushima Nuclear Power Plant accident to investigate how occupational health activities during disasters should be conducted. Seven studies about the WTC attack were extracted and categorized into the following topics: "in relation to emergency systems including occupational health management"; "in relation to improvement and prevention of health effects and occupational hygiene"; and "in relation to care systems aimed at mitigating health effects." Studies about the Fukushima Nuclear Power Plant accident have been used in a previous review. We conclude that, to prevent health effects in workers who respond to large-scale disasters, it is necessary to incorporate occupational health regulations into the national response plan, and to develop practical support functions that enable support to continue for an extended period, training systems for workers with opportunities to report accidents, and care systems to mitigate the health effects.

  9. Structural monitoring for rare events in remote locations

    NASA Astrophysics Data System (ADS)

    Hale, J. M.

    2005-01-01

    A structural monitoring system has been developed for use on high value engineering structures, which is particularly suitable for use in remote locations where rare events such as accidental impacts, seismic activity or terrorist attack might otherwise go undetected. The system comprises a low power intelligent on-site data logger and a remote analysis computer that communicate with one another using the internet and mobile telephone technology. The analysis computer also generates e-mail alarms and maintains a web page that displays detected events in near real-time to authorised users. The application of the prototype system to pipeline monitoring is described in which the analysis of detected events is used to differentiate between impacts and pressure surges. The system has been demonstrated successfully and is ready for deployment.

  10. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  11. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  12. An investigation of wing buffeting response at subsonic and transonic speeds. Phase 2: F-111A flight data analysis. Volume 1: Summary of technical approach, results and conclusions

    NASA Technical Reports Server (NTRS)

    Benepe, D. B.; Cunningham, A. M., Jr.; Traylor, S., Jr.; Dunmyer, W. D.

    1978-01-01

    A detailed investigation of the flight buffeting response of the F-111A was performed in two phases. In Phase 1 stochastic analysis techniques were applied to wing and fuselage responses for maneuvers flown at subsonic speeds and wing leading edge sweep of 26 degrees. Power spectra and rms values were obtained. This report gives results of Phase 2 where the analyses were extended to include maneuvers flown at wing leading edge sweep values of 50 and 75.5 degrees at subsonic and supersonic speeds and the responses examined were expanded to include vertical shear, bending moment, and hingeline torque of the left and right horizontal tails. Power spectra, response time histories, variations of rms response with angle of attack and effects of wing sweep and Mach number are presented and discussed. Some Phase 1 results are given for comparison purposes.

  13. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter

    PubMed Central

    Qin, Zhongyuan; Zhang, Xinshuai; Feng, Kerong; Zhang, Qunfang; Huang, Jie

    2014-01-01

    With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead. PMID:25264955

  14. Radical Responses to Radical Regimes: Evaluating Preemptive Counter-Proliferation

    DTIC Science & Technology

    1995-05-01

    own Governors, must arm themselves with the power which knowledge gives. JAMES MADISON to W. T. BARRY August 4, 1822 RADICAL RESPONSES TO...War II, leading physicists on all sides were cognizant of the possible revolution in explosive power that might be extracted from a uranium bomb...Phantom jets, part of a larger group of aircraft attacking a conventional electric power plant near Baghdad also bombed the Osirak reactor. Minor

  15. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

    NASA Astrophysics Data System (ADS)

    Yuan, Yuan; Sun, Fuchun; Liu, Huaping

    2016-07-01

    This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.

  16. Randomness determines practical security of BB84 quantum key distribution.

    PubMed

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-10

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  17. Randomness determines practical security of BB84 quantum key distribution

    PubMed Central

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-01-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359

  18. Randomness determines practical security of BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  19. Patients' perceptions of their heart attack and recovery: the influence of epidemiological "evidence" and personal experience.

    PubMed

    Wiles, R

    1998-06-01

    Secondary prevention of heart disease is widely viewed as likely to be more successful and cost effective than primary prevention. However, people's willingness to adopt lifestyle change is a complex issue in which people's perceptions of disease causation and risk as well as a range of socio-economic factors are important. This paper reports on a qualitative study of people following heart attack which examines their understandings of heart attack and the salience that lifestyle advice has in the light of these understandings. In-depth, qualitative interviews were conducted with 25 people recovering from heart attack. Each person was interviewed twice: at around two weeks and five months following their heart attack. The study found that information about recovery provided by health professionals was based on a simplified version of epidemiological evidence. This information played a central role in people's understandings about the nature of heart attack and their future risk in the early weeks following heart attack. However, as interviewees came to terms with the shock of the event, they tended to lose their trust in "official" accounts of cause and recovery and evidence from lay epidemiology that contradicted official accounts tended to emerge. This evidence encouraged interviewees to question the explanatory power of official accounts and to view the adoption of long-term lifestyle change as an action that would not guarantee protection from a further heart attack. This was true whether or not people's experiences of recovery reflected those "predicted" by health professionals although those awaiting further surgery or tests tended to maintain trust in official accounts over a longer period. It is concluded that the failure of official accounts to acknowledge the random nature of the occurrence of heart attack, the severity of heart attack and the level of recovery from heart attack is a central feature in people's reluctance to view lifestyle change as a rational action to take to prevent a further cardiac event.

  20. Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Leverrier, Anthony; Grangier, Philippe; Laboratoire Charles Fabry, Institut d'Optique, CNRS, University Paris-Sud, Campus Polytechnique, RD 128, F-91127 Palaiseau Cedex

    2010-06-15

    In this article, we give a simple proof of the fact that the optimal collective attacks against continuous-variable quantum key distribution with a Gaussian modulation are Gaussian attacks. Our proof, which makes use of symmetry properties of the protocol in phase space, is particularly relevant for the finite-key analysis of the protocol and therefore for practical applications.

  1. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  2. Effects-Based Operations: Air Power as the Sole Military Instrument of Power, Has it Matured Enough?

    DTIC Science & Technology

    2006-04-01

    use the current term, but they all tend to favor control of the enemy through EBO rather than physical destruction for its own sake. Operation Allied...would not approve of any attacks against Belgrade’s electrical power grid that would physically destroy it.56 By focusing on the desired effect, US...perspectives on how to orchestrate the air campaign in OEF. CENTCOM had an attrition-based approach and wanted air power to physically destroy all

  3. Hiding the Source Based on Limited Flooding for Sensor Networks.

    PubMed

    Chen, Juan; Lin, Zhengkui; Hu, Ying; Wang, Bailing

    2015-11-17

    Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.

  4. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the computational cost. The proposed algorithm is validated through a linearized longitudinal motion of a UAV example. Finally, we propose an attack attenuation strategy via the controller design for CPSs that are robust to various types of cyber attacks. While the previous studies have investigated a secure control by assuming a specific attack strategy, in this research we propose a hybrid robust control scheme that contains multiple sub-controllers, each matched to a specific type of cyber attacks. Then the system can be adapted to various cyber attacks (including those that are not assumed for sub-controller design) by switching its sub-controllers to achieve the best performance. Then, a method for designing a secure switching logic to counter all possible cyber attacks is proposed and it verifies mathematically the system's performance and stability as well. The performance of the proposed control scheme is demonstrated by an example with the hybrid H2 - H-infinity controller applied to a UAV example.

  5. Differential Fault Analysis on CLEFIA

    NASA Astrophysics Data System (ADS)

    Chen, Hua; Wu, Wenling; Feng, Dengguo

    CLEFIA is a new 128-bit block cipher proposed by SONY corporation recently. The fundamental structure of CLEFIA is a generalized Feistel structure consisting of 4 data lines. In this paper, the strength of CLEFIA against the differential fault attack is explored. Our attack adopts the byte-oriented model of random faults. Through inducing randomly one byte fault in one round, four bytes of faults can be simultaneously obtained in the next round, which can efficiently reduce the total induce times in the attack. After attacking the last several rounds' encryptions, the original secret key can be recovered based on some analysis of the key schedule. The data complexity analysis and experiments show that only about 18 faulty ciphertexts are needed to recover the entire 128-bit secret key and about 54 faulty ciphertexts for 192/256-bit keys.

  6. TANDI: threat assessment of network data and information

    NASA Astrophysics Data System (ADS)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  7. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  8. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  9. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  10. Wind-Tunnel Investigation at Low Speed of the Rolling Stability Derivatives of a 1/9-Scale Powered Model of the Convair XFY-1 Vertically Rising Airplane, TED No. NACA DE 373

    NASA Technical Reports Server (NTRS)

    Queijo, M. J.; Wolhart, Walter D.; Fletcher, H. S.

    1953-01-01

    An experimental investigation has been conducted in the Langley stability tunnel at low speed to determine the rolling stability derivatives of a 1/9-scale powered model of the Convair XFY-1 vertically rising airplane. Effects of thrust coefficient were investigated for the complete model and for certain components of the model. Effects of control deflections and of propeller blade angle were investigated for the complete model. Most of the tests were made through an angle-of-attack range from about -4deg to 29deg, and the thrust coefficient range was from 0 to 0.7. In order to expedite distribution of these data, no analysis of the data has been prepared for this paper.

  11. Wind-Tunnel Investigation at Low Speed of the Yawing Stability Derivatives of a 1/9-Scale Powered Model of the Convair XFY-1 Vertically Rising Airplane, TED No. NACA DE 373

    NASA Technical Reports Server (NTRS)

    Queijo, M. J.; Wolhart, w. D.; Fletcher, H. S.

    1953-01-01

    An experimental investigation has been conducted in the Langley stability tunnel at low speed to deter+nine the yawing stability derivatives of a 1/9-scale powered model of the Convair XFY-1 vertically rising airplane. Effects of thrust coefficient were investigated for the complete model and for certain components of the model. Effects of control deflections and of propeller blade angle were investigated for the complete model. Most of the tests were made through an angle-of-attack range from about -4deg to 29deg, and the thrust coefficient range was from 0 to 0.7. In order to expedite distribution of these data, no analysis of the data has been prepared for this.

  12. Optimal space-time attacks on system state estimation under a sparsity constraint

    NASA Astrophysics Data System (ADS)

    Lu, Jingyang; Niu, Ruixin; Han, Puxiao

    2016-05-01

    System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

  13. Theoretical Analysis of the Longitudinal Behavior of an Automatically Controlled Supersonic Interceptor During the Attack Phase

    NASA Technical Reports Server (NTRS)

    Gates, Ordway B., Jr.; Woodling, C. H.

    1959-01-01

    Theoretical analysis of the longitudinal behavior of an automatically controlled supersonic interceptor during the attack phase against a nonmaneuvering target is presented. Control of the interceptor's flight path is obtained by use of a pitch rate command system. Topics lift, and pitching moment, effects of initial tracking errors, discussion of normal acceleration limited, limitations of control surface rate and deflection, and effects of neglecting forward velocity changes of interceptor during attack phase.

  14. Satellite Power System (SPS) military implications

    NASA Technical Reports Server (NTRS)

    Bain, C. N.

    1978-01-01

    The military implications of the reference satellite power system (SPS) were examined is well as important military related study tasks. Primary areas of investigation were the potential of the SPS as a weapon, for supporting U.S. military preparedness, and for affecting international relations. In addition, the SPS's relative vulnerability to overt military action, terrorist attacks, and sabotage was considered.

  15. DOD Supply Chain: Preliminary Observations Indicate That Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms

    DTIC Science & Technology

    2011-11-08

    Corps’ V-22 Osprey aircraft, and the Navy’s SSN-688 Los Angeles Class nuclear-powered attack submarine . If authentic, these parts provide accurate power...even d Different color epoxy seals were noted within both lots according to SMT Corp., which is common in suspect counterfeit devices

  16. EDIN design study alternate space shuttle booster replacement concepts. Volume 1: Engineering analysis

    NASA Technical Reports Server (NTRS)

    Demakes, P. T.; Hirsch, G. N.; Stewart, W. A.; Glatt, C. R.

    1976-01-01

    The use of a recoverable liquid rocket booster (LRB) system to replace the existing solid rocket booster (SRB) system for the shuttle was studied. Historical weight estimating relationships were developed for the LRB using Saturn technology and modified as required. Mission performance was computed using February 1975 shuttle configuration groundrules to allow reasonable comparison of the existing shuttle with the study designs. The launch trajectory was constrained to pass through both the RTLS/AOA and main engine cut off points of the shuttle reference mission 1. Performance analysis is based on a point design trajectory model which optimizes initial tilt rate and exoatmospheric pitch profile. A gravity turn was employed during the boost phase in place of the shuttle angle of attack profile. Engine throttling add/or shutdown was used to constrain dynamic pressure and/or longitudinal acceleration where necessary. Four basic configurations were investigated: a parallel burn vehicle with an F-1 engine powered LRB; a parallel burn vehicle with a high pressure engine powered LRB; a series burn vehicle with a high pressure engine powered LRB. The relative sizes of the LRB and the ET are optimized to minimize GLOW in most cases.

  17. Testing of YUH-61A helicopter transmission in NASA Lewis 2240-kW (3000-hp facility

    NASA Technical Reports Server (NTRS)

    Mitchell, A. M.; Oswald, F. B.; Schuller, F. T.

    1986-01-01

    A helicopter transmission that was being considered for the Army's Utility Tactical Transport Attack System (UTTAS) was tested in the NASA Lewis 2240-kW (3000-hp) test facility to obtain the transmission's operational data. The results will form a vibration and efficiency data base for evaluation similar-class helicopter transmissions. The transmission's mechanical efficiency was determined to be 98.7 percent at its rated power level of 2080 kW (2792 hp). At power levels up to 113 percent of rated the transmission displayed 56 percent higher vibration acceleration levels on the right input than on the left input. Both vibration signature analysis and final visual inspection indicated that the right input spiral-bevel gear had poor contact patterns. The highest vibration meter level was 52 g's rms at the accessory gear, which had free-wheeling gearsets. At 113 percent power and 100 percent rated speed the vibration meter levels generally ranged from 3 to 25 g's rms.

  18. Timing of prophylactic surgery in prevention of diverticulitis recurrence: a cost-effectiveness analysis.

    PubMed

    Richards, Robert J; Hammitt, James K

    2002-09-01

    Although surgery is recommended after two or more attacks of uncomplicated diverticulitis, the optimal timing for surgery in terms of cost-effectiveness is unknown. A Markov model was used to compare the costs and outcomes of performing surgery after one, two, or three uncomplicated attacks in 60-year-old hypothetical cohorts. Transition state probabilities were assigned values using published data and expert opinion. Costs were estimated from Medicare reimbursement rates. Surgery after the third attack is cost saving, yielding more years of life and quality adjusted life years at a lower cost than the other two strategies. The results were not sensitive to many of the variables tested in the model or to changes made in the discount rate (0-5%). In conclusion, performing prophylactic resection after the third attack of diverticulitis is cost saving in comparison to resection performed after the first or second attacks and remains cost-effective during sensitivity analysis.

  19. Adversarial risk analysis with incomplete information: a level-k approach.

    PubMed

    Rothschild, Casey; McLay, Laura; Guikema, Seth

    2012-07-01

    This article proposes, develops, and illustrates the application of level-k game theory to adversarial risk analysis. Level-k reasoning, which assumes that players play strategically but have bounded rationality, is useful for operationalizing a Bayesian approach to adversarial risk analysis. It can be applied in a broad class of settings, including settings with asynchronous play and partial but incomplete revelation of early moves. Its computational and elicitation requirements are modest. We illustrate the approach with an application to a simple defend-attack model in which the defender's countermeasures are revealed with a probability less than one to the attacker before he decides on how or whether to attack. © 2011 Society for Risk Analysis.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    MacDonald, Douglas G.; Clements, Samuel L.; Patrick, Scott W.

    Securing high value and critical assets is one of the biggest challenges facing this nation and others around the world. In modern integrated systems, there are four potential modes of attack available to an adversary: • physical only attack, • cyber only attack, • physical-enabled cyber attack, • cyber-enabled physical attack. Blended attacks involve an adversary working in one domain to reduce system effectiveness in another domain. This enables the attacker to penetrate further into the overall layered defenses. Existing vulnerability assessment (VA) processes and software tools which predict facility vulnerabilities typically evaluate the physical and cyber domains separately. Vulnerabilitiesmore » which result from the integration of cyber-physical control systems are not well characterized and are often overlooked by existing assessment approaches. In this paper, we modified modification of the timely detection methodology, used for decades in physical security VAs, to include cyber components. The Physical and Cyber Risk Analysis Tool (PACRAT) prototype illustrates an integrated vulnerability assessment that includes cyber-physical interdependencies. Information about facility layout, network topology, and emplaced safeguards is used to evaluate how well suited a facility is to detect, delay, and respond to attacks, to identify the pathways most vulnerable to attack, and to evaluate how often safeguards are compromised for a given threat or adversary type. We have tested the PACRAT prototype on critical infrastructure facilities and the results are promising. Future work includes extending the model to prescribe the recommended security improvements via an automated cost-benefit analysis.« less

  1. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  2. Investigation of the asymmetric aerodynamic characteristics of cylindrical bodies of revolution with variations in nose geometry and rotational orientation at angles of attack to 58 degrees and Mach numbers to 2

    NASA Technical Reports Server (NTRS)

    Kruse, R. L.; Keener, E. R.; Chapman, G. T.; Claser, G.

    1979-01-01

    Wind-tunnel tests were conducted to investigate the side forces and yawing moments that can occur at high angles of attack and zero sideslip for cylindrical bodies of revolution. Two bodies having several tangent ogive forebodies with fineness ratios of 0.5, 1.5, 2.5, and 3.5 were tested. The forebodies with fineness ratios of 2.5 and 3.5 had several bluntnesses. The cylindrical afterbodies had fineness ratios of 7 and 13. The model components - tip, forebody, and afterbody - were tested in various rotational positions about their axes of symmetry. Most of the tests were conducted at a Mach number of 0.25, a Reynolds number of 0.32 x 10 to the 6th power, and with the afterbody that had a fineness ratio of 7 and with selected forebodies. The effect of Mach number was determined with the afterbody that had a fineness ratio of 13 and with selected forebodies at mach numbers from 0.25 to 2 at Reynolds number = 0.32 X 10 to the 6th power. Maximum angle of attack was 58 deg.

  3. Synchrophasor Data Correction under GPS Spoofing Attack: A State Estimation Based Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fan, Xiaoyuan; Du, Liang; Duan, Dongliang

    GPS spoofing attack (GSA) has been shown to be one of the most imminent threats to almost all cyber-physical systems incorporated with the civilian GPS signal. Specifically, for our current agenda of the modernization of the power grid, this may greatly jeopardize the benefits provided by the pervasively installed phasor measurement units (PMU). In this study, we consider the case where synchrophasor data from PMUs are compromised due to the presence of a single GSA, and show that it can be corrected by signal processing techniques. In particular, we introduce a statistical model for synchrophasorbased power system state estimation (SE),more » and then derive the spoofing-matched algorithms for synchrophasor data correction against GPS spoofing attack. Different testing scenarios in IEEE 14-, 30-, 57-, 118-bus systems are simulated to show the proposed algorithms’ performance on GSA detection and state estimation. Numerical results demonstrate that our proposed algorithms can consistently locate and correct the spoofed synchrophasor data with good accuracy as long as the system observability is satisfied. Finally, the accuracy of state estimation is significantly improved compared with the traditional weighted least square method and approaches the performance under the Genie-aided method.« less

  4. Effect of a rotating propeller on the separation angle of attack and distortion in ducted propeller inlets

    NASA Technical Reports Server (NTRS)

    Boldman, D. R.; Iek, C.; Hwang, D. P.; Larkin, M.; Schweiger, P.

    1993-01-01

    The present study represents an extension of an earlier wind tunnel experiment performed with the P&W 17-in. Advanced Ducted Propeller (ADP) Simulator operating at Mach 0.2. In order to study the effects of a rotating propeller on the inlet flow, data were obtained in the UTRC 10- by 15-Foot Large Subsonic Wind Tunnel with the same hardware and instrumentation, but with the propeller removed. These new tests were performed over a range of flow rates which duplicated flow rates in the powered simulator program. The flow through the inlet was provided by a remotely located vacuum source. A comparison of the results of this flow-through study with the previous data from the powered simulator indicated that in the conventional inlet the propeller produced an increase in the separation angle of attack between 4.0 deg at a specific flow of 22.4 lb/sec-sq ft to 2.7 deg at a higher specific flow of 33.8 lb/sec-sq ft. A similar effect on separation angle of attack was obtained by using stationary blockage rather than a propeller.

  5. In-flight measurement of propeller noise on the fuselage of an airplane

    NASA Technical Reports Server (NTRS)

    Pla, Frederic G.; Ranaudo, Richard; Woodward, Richard P.

    1989-01-01

    In-flight measurements of propeller noise on the fuselage of an OV-10A aircraft were obtained using a horizontal and a vertical microphone array. A wide range of flight conditions were tested including changes in angle of attack, sideslip angle, power coefficient, helical tip Mach number and advance ratio, and propeller direction of rotation. Results show a dependence of the level and directivity of the tones on the angle of attack and on the sideslip angle with the propeller direction of rotation, which is similar to results obtained in wind tunnel tests with advanced propeller designs. The level of the tones at each microphone increases with increasing angle of attack for inboard-down propeller rotation and decreases for inboard-up rotation. The level also increases with increasing slideslip angle for both propeller directions of rotation. Increasing the power coefficient results in a slight increase in the level of the tones. A strong shock wave is generated by the propeller blades even at relatively low helical tip Mach numbers resulting in high harmonic levels. As the helical tip Mach number and the advance ratio are increased, the level of the higher harmonics increases much faster than the level of the blade passage frequency.

  6. Low-speed aerodynamic characteristics of a twin-engine general aviation configuration with aft-fuselage-mounted pusher propellers

    NASA Technical Reports Server (NTRS)

    Dunham, Dana Morris; Gentry, Garl L., Jr.; Manuel, Gregory S.; Applin, Zachary T.; Quinto, P. Frank

    1987-01-01

    An investigation was conducted to determine the aerodynamic characteristics of an advanced turboprop aircraft model with aft-pylon-mounted pusher propellers. Tests were conducted through an angle-of-attack range of -8 to 28 degrees, and an angle-of-sideslip range of -20 to 20 degrees at free-stream conditions corresponding to Reynolds numbers of 0.55 to 2.14 x 10 to the 6th power based on mean aerodynamic chord. Test results show that for the unpowered configurations the maximum lift coefficients for the cruise, takeoff, and landing configurations are 1.45, 1.90, and 2.10, respectively. Nacelle installation results in a drag coefficient increase of 0.01. Increasing propeller thrust results in a significant increase in lift for angles of attack above stall and improves the longitudinal stability. The cruise configuration remains longitudinally stable to an angle of attack 5 degrees beyond the stall angle, the takeoff configuration is stable 4 degrees beyond stall angle, and the landing configuration is stable 3 degrees beyond stall angle. The predominant effect of symmetric thrust on the lateral-directional aerodynamic characteristics is in the post-stall region, where additional rudder control is available with power on.

  7. Synchrophasor Data Correction under GPS Spoofing Attack: A State Estimation Based Approach

    DOE PAGES

    Fan, Xiaoyuan; Du, Liang; Duan, Dongliang

    2017-02-01

    GPS spoofing attack (GSA) has been shown to be one of the most imminent threats to almost all cyber-physical systems incorporated with the civilian GPS signal. Specifically, for our current agenda of the modernization of the power grid, this may greatly jeopardize the benefits provided by the pervasively installed phasor measurement units (PMU). In this study, we consider the case where synchrophasor data from PMUs are compromised due to the presence of a single GSA, and show that it can be corrected by signal processing techniques. In particular, we introduce a statistical model for synchrophasorbased power system state estimation (SE),more » and then derive the spoofing-matched algorithms for synchrophasor data correction against GPS spoofing attack. Different testing scenarios in IEEE 14-, 30-, 57-, 118-bus systems are simulated to show the proposed algorithms’ performance on GSA detection and state estimation. Numerical results demonstrate that our proposed algorithms can consistently locate and correct the spoofed synchrophasor data with good accuracy as long as the system observability is satisfied. Finally, the accuracy of state estimation is significantly improved compared with the traditional weighted least square method and approaches the performance under the Genie-aided method.« less

  8. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults.

    PubMed

    Swanoski, Michael T; Lutfiyya, May Nawal; Amaro, Maria L; Akers, Michael F; Huot, Krista L

    2012-06-01

    Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS) database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP), timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. The weighted n for this study overall was 103,262,115 U.S. adults  > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR=1.218 95%CI 1.216-1.219) rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR=1.353 95%CI 1.352-1.354), >65 years of age (OR=1.369 95%CI 1.368-1.371), African American (OR=1.892 95%CI 1.889-1.894), not educated beyond high school (OR=1.400 955CI 1.399-1.402), uninsured (OR=1.308 95%CI 1.3-6-1.310), without a HCP (OR=1.216 95%CI 1.215-1.218), and living in a household with an annual income of  < $50,000 (OR=1.429 95%CI 1.428-1.431). Analysis identified clear disparities between the knowledge levels U.S. adults have regarding heart attack and stroke symptoms. These disparities should guide educational endeavors focusing on improving knowledge of heart attack and stroke symptoms.

  9. Knowledge of heart attack and stroke symptomology: a cross-sectional comparison of rural and non-rural US adults

    PubMed Central

    2012-01-01

    Background Understanding the signs and symptoms of heart attacks and strokes are important not only in saving lives, but also in preserving quality of life. Findings from recent research have yielded that the prevalence of cardiovascular disease risk factors are higher in rural populations, suggesting that adults living in rural locales may be at higher risk for heart attack and/or stroke. Knowledge of heart attack and stroke symptomology as well as calling 911 for a suspected heart attack or stroke are essential first steps in seeking care. This study sought to examine the knowledge of heart attack and stroke symptoms among rural adults in comparison to non-rural adults living in the U.S. Methods Using multivariate techniques, a cross-sectional analysis of an amalgamated multi-year Behavioral Risk Factor Surveillance Survey (BRFSS) database was performed. The dependent variable for this analysis was low heart attack and stroke knowledge score. The covariates for the analysis were: age, sex, race/ethnicity, annual household income, attained education, health insurance status, having a health care provider (HCP), timing of last routine medical check-up, medical care deferment because of cost, self-defined health status and geographic locale. Results The weighted n for this study overall was 103,262,115 U.S. adults > =18 years of age. Approximately 22.0% of these respondents were U.S. adults living in rural locales. Logistic regression analysis revealed that those U.S. adults who had low composite heart attack and stroke knowledge scores were more likely to be rural (OR = 1.218 95%CI 1.216-1.219) rather than non-rural residents. Furthermore, those with low scores were more likely to be: male (OR = 1.353 95%CI 1.352-1.354), >65 years of age (OR = 1.369 95%CI 1.368-1.371), African American (OR = 1.892 95%CI 1.889-1.894), not educated beyond high school (OR = 1.400 955CI 1.399-1.402), uninsured (OR = 1.308 95%CI 1.3-6-1.310), without a HCP (OR = 1.216 95%CI 1.215-1.218), and living in a household with an annual income of < $50,000 (OR = 1.429 95%CI 1.428-1.431). Conclusions Analysis identified clear disparities between the knowledge levels U.S. adults have regarding heart attack and stroke symptoms. These disparities should guide educational endeavors focusing on improving knowledge of heart attack and stroke symptoms. PMID:22490185

  10. Characteristic features of injuries due to shark attacks: a review of 12 cases.

    PubMed

    Ihama, Yoko; Ninomiya, Kenji; Noguchi, Masamichi; Fuke, Chiaki; Miyazaki, Tetsuji

    2009-09-01

    Shark attacks on humans might not occur as often as is believed and the characteristic features of shark injuries on corpses have not been extensively reviewed. We describe the characteristic features of shark injuries on 12 corpses. The analysis of these injuries might reveal the motivation behind the attacks and/or the shark species involved in the attack. Gouge marks on the bones are evidence of a shark attack, even if the corpse is decomposed. Severance of the body part at the joints without a fracture was found to be a characteristic feature of shark injuries.

  11. Automatic analysis of attack data from distributed honeypot network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel

    2013-05-01

    There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.

  12. Resilience of networks formed of interdependent modular networks

    NASA Astrophysics Data System (ADS)

    Shekhtman, Louis M.; Shai, Saray; Havlin, Shlomo

    2015-12-01

    Many infrastructure networks have a modular structure and are also interdependent with other infrastructures. While significant research has explored the resilience of interdependent networks, there has been no analysis of the effects of modularity. Here we develop a theoretical framework for attacks on interdependent modular networks and support our results through simulations. We focus, for simplicity, on the case where each network has the same number of communities and the dependency links are restricted to be between pairs of communities of different networks. This is particularly realistic for modeling infrastructure across cities. Each city has its own infrastructures and different infrastructures are dependent only within the city. However, each infrastructure is connected within and between cities. For example, a power grid will connect many cities as will a communication network, yet a power station and communication tower that are interdependent will likely be in the same city. It has previously been shown that single networks are very susceptible to the failure of the interconnected nodes (between communities) (Shai et al 2014 arXiv:1404.4748) and that attacks on these nodes are even more crippling than attacks based on betweenness (da Cunha et al 2015 arXiv:1502.00353). In our example of cities these nodes have long range links which are more likely to fail. For both treelike and looplike interdependent modular networks we find distinct regimes depending on the number of modules, m. (i) In the case where there are fewer modules with strong intraconnections, the system first separates into modules in an abrupt first-order transition and then each module undergoes a second percolation transition. (ii) When there are more modules with many interconnections between them, the system undergoes a single transition. Overall, we find that modular structure can significantly influence the type of transitions observed in interdependent networks and should be considered in attempts to make interdependent networks more resilient.

  13. Physical Attacks: An Analysis of Teacher Characteristics Using the Schools and Staffing Survey

    ERIC Educational Resources Information Center

    Williams, Thomas O., Jr.; Ernst, Jeremy V.

    2016-01-01

    This study investigated physical attacks as reported by public school teachers on the most recent Schools and Staffing Survey (SASS) from the National Center for Education Statistics administered by the Institute of Educational Sciences. For this study, characteristics of teachers who responded affirmatively to having been physically attacked in…

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hoette, Trisha Marie

    Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of themore » attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.« less

  15. Analysis of Protection Measures for Naval Vessels Berthed at Harbor Against Terrorist Attacks

    DTIC Science & Technology

    2016-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited ANALYSIS OF...2016 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ANALYSIS OF PROTECTION MEASURES FOR NAVAL VESSELS BERTHED AT HARBOR... ANALYSIS OF PROTECTION MEASURES FOR NAVAL VESSELS BERTHED AT HARBOR AGAINST TERRORIST ATTACKS Raja I. Sikandar Lieutenant Commander, Pakistan Navy

  16. Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence

    NASA Astrophysics Data System (ADS)

    Muraleedharan, Rajani; Ye, Xiang; Osadciw, Lisa Ann

    2008-04-01

    Security in wireless sensor networks is typically sacrificed or kept minimal due to limited resources such as memory and battery power. Hence, the sensor nodes are prone to Denial-of-service attacks and detecting the threats is crucial in any application. In this paper, the Sybil attack is analyzed and a novel prediction method, combining Bayesian algorithm and Swarm Intelligence (SI) is proposed. Bayesian Networks (BN) is used in representing and reasoning problems, by modeling the elements of uncertainty. The decision from the BN is applied to SI forming an Hybrid Intelligence Scheme (HIS) to re-route the information and disconnecting the malicious nodes in future routes. A performance comparison based on the prediction using HIS vs. Ant System (AS) helps in prioritizing applications where decisions are time-critical.

  17. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    PubMed Central

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  18. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    PubMed

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  19. Unsteady characteristics of a slat-cove flow field

    NASA Astrophysics Data System (ADS)

    Pascioni, Kyle A.; Cattafesta, Louis N.

    2018-03-01

    The leading-edge slat of a multielement wing is a significant contributor to the acoustic signature of an aircraft during the approach phase of the flight path. An experimental study of the two-dimensional 30P30N geometry is undertaken to further understand the flow physics and specific noise source mechanisms. The mean statistics from particle image velocimetry (PIV) shows the differences in the flow field with angle of attack, including the interaction between the cove and trailing-edge flow. Phase-locked PIV successfully links narrow-band peaks found in the surface pressure spectrum to shear layer instabilities and also reveals that a bulk cove oscillation at a Strouhal number based on a slat chord of 0.15 exists, indicative of shear layer flapping. Unsteady surface pressure measurements are documented and used to estimate spanwise coherence length scales. A narrow-band frequency prediction scheme is also tested and found to agree well with the data. Furthermore, higher-order spectral analysis suggests that nonlinear effects cause additional peaks to arise in the power spectrum, particularly at low angles of attack.

  20. Algorithm of reducing the false positives in IDS based on correlation Analysis

    NASA Astrophysics Data System (ADS)

    Liu, Jianyi; Li, Sida; Zhang, Ru

    2018-03-01

    This paper proposes an algorithm of reducing the false positives in IDS based on correlation Analysis. Firstly, the algorithm analyzes the distinguishing characteristics of false positives and real alarms, and preliminary screen the false positives; then use the method of attribute similarity clustering to the alarms and further reduces the amount of alarms; finally, according to the characteristics of multi-step attack, associated it by the causal relationship. The paper also proposed a reverse causation algorithm based on the attack association method proposed by the predecessors, turning alarm information into a complete attack path. Experiments show that the algorithm simplifies the number of alarms, improve the efficiency of alarm processing, and contribute to attack purposes identification and alarm accuracy improvement.

  1. Continuous-Variable Measurement-Device-Independent Multipartite Quantum Communication Using Coherent States

    NASA Astrophysics Data System (ADS)

    Zhou, Jian; Guo, Ying

    2017-02-01

    A continuous-variable measurement-device-independent (CV-MDI) multipartite quantum communication protocol is designed to realize multipartite communication based on the GHZ state analysis using Gaussian coherent states. It can remove detector side attack as the multi-mode measurement is blindly done in a suitable Black Box. The entanglement-based CV-MDI multipartite communication scheme and the equivalent prepare-and-measurement scheme are proposed to analyze the security and guide experiment, respectively. The general eavesdropping and coherent attack are considered for the security analysis. Subsequently, all the attacks are ascribed to coherent attack against imperfect links. The asymptotic key rate of the asymmetric configuration is also derived with the numeric simulations illustrating the performance of the proposed protocol.

  2. Cybersecurity Awareness in the Power Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scholtz, Jean; Franklin, Lyndsey; Le Blanc, Katya L.

    2016-07-10

    We report on a series of interviews and observations conducted with control room dispatchers in a bulk electrical system. These dispatchers must react quickly to incidents as they happen in order to ensure the reliability and safe operation of the power grid. They do not have the time to evaluate incidents for signs of cyber-attack as part of their initial response. Cyber-attack detection involves multiple personnel from a variety of roles at both local and regional levels. Smart grid technology will improve detection and defense capabilities of the future grid, however, the current infrastructure remains a mixture of old andmore » new equipment which will continue to operate for some time. Thus, research still needs to focus on strategies for the detection of malicious activity on current infrastructure as well as protection and remediation.« less

  3. Action mechanism of tyrosinase on meta- and para-hydroxylated monophenols.

    PubMed

    Fenoll, L G; Rodríguez-López, J N; Varón, R; García-Ruiz, P A; García-Cánovas, F; Tudela, J

    2000-04-01

    The relationship between the structure and activity of meta- and para-hydroxylated monophenols was studied during their tyrosinase-catalysed hydroxylation and the rate-limiting steps of the reaction mechanism were identified. The para-hydroxylated substrates permit us to study the effect of a substituent (R) in the carbon-1 position (C-1) of the benzene ring on the nucleophilic attack step, while the meta group permits a similar study of the effect on the electrophilic attack step. Substrates with a -OCH3 group on C-1, as p-hydroxyanisol (4HA) and m-hydroxyanisol (3HA), or with a -CH2OH group, as p-hydroxybenzylalcohol (4HBA) and m-hydroxybenzylalcohol (3HBA), were used because the effect of the substituent (R) size was assumed to be similar. However, the electron-donating effect of the -OCH3 group means that the carbon-4 position (C-4) is favoured for nucleophilic attack (para-hydroxylated substrates) or for electrophilic attack (meta-hydroxylated substrates). The electron-attracting effect of the -CH2OH group has the opposite effect, hindering nucleophilic (para) or electrophilic (meta) attack of C-4. The experimental data point to differences between the maximum steady-state rate (V(M)Max) of the different substrates, the value of this parameter depends on the nucleophilic and electrophilic attack. However, differences are greatest in the Michaelis constants (K(M)m), with the meta-hydroxylated substrates having very large values. The catalytic efficiency k(M)cat/K(M)m is much greater for thepara-hydroxylated substrates although it varies greatly between one substrate and the other. However, it varies much less in the meta-hydroxylated substrates since this parameter describes the power of the nucleophilic attack, which is weaker in the meta OH. The large increase in the K(M)m of the meta-hydroxylated substrates might suggest that the phenolic OH takes part in substrate binding. Since this is a weaker nucleophil than the para-hydroxylated substrates, the binding constant decreases, leading to an increase in K(M)m. The catalytic efficiency of tyrosinase on a monophenol (para or meta) is directly related to the nucleophilic power of the oxygen of the phenolic OH. The oxidation step is not limiting since if this were the case, the para and meta substrates would have the same V(M)max. The small difference between the absolute values of V(M)max suggests that the rate constants of the nucleophilic and electrophilic attacks are on the same order of magnitude.

  4. Emergency care centers--an efficient method for mitigation of consequences after a dirty bomb attack.

    PubMed

    Miska, Horst

    2012-08-01

    For emergency preparedness and response with respect to nuclear power plant accidents, the concept of Emergency Care Centers has been developed in Germany. This setup aims at monitoring contamination, to decontaminate if needed, assess the dose, and perform an initial medical evaluation of people who might have been affected by the accident. The concept has been tested in many exercises. In response to a terrorist attack involving a dirty bomb, this concept may prove useful for attending contaminated people who are not severely injured.

  5. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    PubMed

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  6. Design and implementation of dynamic hybrid Honeypot network

    NASA Astrophysics Data System (ADS)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  7. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.

    PubMed

    Payyappalli, Vineet M; Zhuang, Jun; Jose, Victor Richmond R

    2017-11-01

    Most attacker-defender games consider players as risk neutral, whereas in reality attackers and defenders may be risk seeking or risk averse. This article studies the impact of players' risk preferences on their equilibrium behavior and its effect on the notion of deterrence. In particular, we study the effects of risk preferences in a single-period, sequential game where a defender has a continuous range of investment levels that could be strategically chosen to potentially deter an attack. This article presents analytic results related to the effect of attacker and defender risk preferences on the optimal defense effort level and their impact on the deterrence level. Numerical illustrations and some discussion of the effect of risk preferences on deterrence and the utility of using such a model are provided, as well as sensitivity analysis of continuous attack investment levels and uncertainty in the defender's beliefs about the attacker's risk preference. A key contribution of this article is the identification of specific scenarios in which the defender using a model that takes into account risk preferences would be better off than a defender using a traditional risk-neutral model. This study provides insights that could be used by policy analysts and decisionmakers involved in investment decisions in security and safety. © 2017 Society for Risk Analysis.

  8. Space power system utilizing Fresnel lenses for solar power and also thermal energy storage

    NASA Technical Reports Server (NTRS)

    Turner, R. H.

    1983-01-01

    A solar power plant suitable for earth orbits passing through Van Allen radiation belts is described. The solar-to-electricity conversion efficiency is estimated to be around 9 percent, and the expected power-to-weight ratio is competitive with photovoltaic arrays. The system is designed to be self-contained, to be indifferent to radiation belt exposures, store energy for periods when the orbiting system is in earth shadow (so that power generation is contant), have no moving parts and no working fluids, and be robust against micrometeorite attack. No electrical batteries are required.

  9. Analysis of Special Operations Forces in Decision Aids: Recommendations,

    DTIC Science & Technology

    1994-01-01

    Soviet-made armored scout cars operated by Malaysian troops. By that time, the United States had lost 102 men-18 killed and 84 wounded. Somali leaders...designation of targets; attack by F-15E and F-16C using CBU-87, -89 Execution and GBU; attack by A-10 using Maverick and 30-mm cannon; attack by B-52 using...patrolling designated areas of the battlefield and attacking individual armored vehicles with precision-guided weapons such as Maverick . Discontinuity

  10. The Economic and Risk Constraints in the Feasibility Analysis of Wireless Communications in Marine Corps Combat Operation Centers

    DTIC Science & Technology

    2013-09-01

    attacker can acquire and use against a wireless infrastructure. Wireless attack tool kits such as the “ Raspberry – PI ” (shown in Figure 10), and...still use a tool such as the Raspberry – PI to perform attacks against a network from outside the controlled area or even inside the controlled area...when considering an insider attack. Figure 10. (From www.howtodocomputing.blogspot.com, n.d.) Wireless – PI is “a collection of pre-configured

  11. Detecting Man-in-the-Middle Attacks against Transport Layer Security Connections with Timing Analysis

    DTIC Science & Technology

    2011-09-15

    Networks (VPNs), TLS protects massive amounts of private information, and protecting this data from Man-in-the-Middle ( MitM ) attacks is imperative to...keeping the information secure. This thesis illustrates how an attacker can successfully perform a MitM attack against a TLS connection without alerting...mechanism a user has against a MitM . The goal for this research is to determine if a time threshold exists that can indicate the presence of a MitM in this

  12. Air pollution sources and childhood asthma attacks in Catano, Puerto Rico.

    PubMed

    Loyo-Berríos, Nilsa I; Irizarry, Rafael; Hennessey, Joseph G; Tao, Xuguang Grant; Matanoski, Genevieve

    2007-04-15

    Asthma prevalence in the Cataño Air Basin of Puerto Rico is 27% for children aged 13-14 years and 45% for children aged 5-6 years. There is concern that these rates are related to air pollution. The authors conducted a nested case-control study to evaluate whether proximity to air pollution point sources was associated with increased risk of asthma attacks. For 1997-2001, 1,382 asthma-related medical visits (International Classification of Diseases, Ninth Revision, codes 493 and 493.9) in children under 17 were identified through health insurance claims. Controls were children with no asthma attacks who were randomly selected from enrollees in two health insurance companies by incidence density sampling (1:5) and matched to cases on gender, age, insurance company, and event date. The distance from a point source to the subject's residence area represented a surrogate exposure measurement. Odds ratios for a 1-km decrease in distance were obtained by conditional logistic regression. Risk of asthma attack was associated with residing near a grain mill (odds ratio (OR) = 1.35), petroleum refinery (OR = 1.44), asphalt plant (OR = 1.23), or power plant (OR = 1.28) (all p's < 0.05). Residence near major air emissions sources (>100 tons/year) increased asthma attack risk by 108% (p < 0.05). These results showed that proximity to some air pollution sources is associated with increased risks of asthma attacks.

  13. Assessing Uncertainties in Boundary Layer Transition Predictions for HIFiRE-1 at Non-zero Angles of Attack

    NASA Technical Reports Server (NTRS)

    Marek, Lindsay C.

    2011-01-01

    Boundary layer stability was analyzed for the HIFiRE-1 flight vehicle geometry for ground tests conducted at the CUBRC LENS I hypersonic shock test facility and the Langley Research Center (LaRC) 20- inch Mach 6 Tunnel. Boundary layer stability results were compared to transition onset location obtained from discrete heat transfer measurements from thin film gauges during the CUBRC test and spatially continuous heat transfer measurements from thermal phosphor paint data during the LaRC test. The focus of this analysis was on conditions at non-zero angles of attack as stability analysis has already been performed at zero degrees angle of attack. Also, the transition onset data obtained during flight testing was at nonzero angles of attack, so this analysis could be expanded in the future to include the results of the flight test data. Stability analysis was performed using the 2D parabolized stability software suite STABL (Stability and Transition Analysis for Hypersonic Boundary Layers) developed at the University of Minnesota and the mean flow solutions were computed using the DPLR finite volume Navier-Stokes computational fluid dynamics (CFD) solver. A center line slice of the 3D mean flow solution was used for the stability analysis to incorporate the angle of attack effects while still taking advantage of the 2D STABL software suite. The N-factors at transition onset and the value of Re(sub theta)/M(sub e), commonly used to predict boundary layer transition onset, were compared for all conditions analyzed. Ground test data was analyzed at Mach 7.2 and Mach 6.0 and angles of attack of 1deg, 3deg and 5deg. At these conditions, the flow was found to be second mode dominant for the HIFiRE-1 slender cone geometry. On the leeward side of the vehicle, a strong trend of transition onset location with angle of attack was observed as the boundary layer on the leeward side of the vehicle developed inflection points at streamwise positions on the vehicle that correlated to angle of attack. Inflection points are a strong instability mechanism that lead to rapid breakdown and transition to turbulence. The transition onset location on the windward side of the vehicle displayed no trend with angle of attack or freestream Reynolds number and transition was observed farther down the vehicle than observed on the leeward side of the vehicle. In analysis of both windward and leeward sides of the vehicle, use of the N factor methodology to develop trends to predict boundary layer transition onset showed improvements over the Re(sub theta)/M(sub e) empirical correlation methodology. Stronger correlations and less scatter in the data were observed when using the N factor method for these cases.

  14. Advanced Cyber Attack Modeling Analysis and Visualization

    DTIC Science & Technology

    2010-03-01

    Graph Analysis Network Web Logs Netflow Data TCP Dump Data System Logs Detect Protect Security Management What-If Figure 8. TVA attack graphs for...Clustered Graphs,” in Proceedings of the Symposium on Graph Drawing, September 1996. [25] K. Lakkaraju, W. Yurcik, A. Lee, “NVisionIP: NetFlow

  15. Development and Analysis of Security Policies in Security Enhanced Android

    DTIC Science & Technology

    2012-12-01

    Privilege - Escalation Attacks on Android ,” Proc. 19th Annual...Services, Bethesda, MD, 2011, pp. 239–252. 98 [43] L. Davi, et al. “ Privilege Escalation Attacks on Android ,” Proc. 13th Int. Conf. on Information...TaintDroid. XManDroid dynamically analyzes applications’ transitive permission usage in order to prevent application-level privilege escalation attacks

  16. Interpersonal coordination tendencies supporting the creation/prevention of goal scoring opportunities in futsal.

    PubMed

    Vilar, Luís; Araújo, Duarte; Davids, Keith; Travassos, Bruno; Duarte, Ricardo; Parreira, João

    2014-01-01

    Research on 1vs1 sub-phases in team sports has shown how one player coordinates his/her actions with his/her opponent and the location of a target/goal to attain performance objectives. In this study, we extended this approach to analysis of 5vs5 competitive performance in the team sport of futsal to provide a performance analysis framework that explains how players coordinate their actions to create/prevent opportunities to score goals. For this purpose, we recorded all 10 futsal matches of the 2009 Lusophony Games held in Lisbon. We analysed the displacement trajectories of a shooting attacker and marking defender in plays ending in a goal, a goalkeeper's save, and a defender's interception, at four specific moments during performance: (1) assisting attacker's ball reception and (2) moment of passing, (3) shooter's ball reception, and (4), shot on goal. Statistical analysis showed that when a goal was scored, the defender's angle to the goal and to the attacker tended to decrease, the attacker was able to move to the same distance to the goal alongside the defender, and the attacker was closer to the defender and moving at the same velocity (at least) as the defender. This study identified emergent patterns of coordination between attackers and defenders under key competitive task constraints, such as the location of the goal, which supported successful performance in futsal.

  17. Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time-Series and Intervention Analysis.

    PubMed

    Li, Shuying; Zhuang, Jun; Shen, Shifei

    2017-07-01

    In recent years, various types of terrorist attacks occurred, causing worldwide catastrophes. According to the Global Terrorism Database (GTD), among all attack tactics, bombing attacks happened most frequently, followed by armed assaults. In this article, a model for analyzing and forecasting the conditional probability of bombing attacks (CPBAs) based on time-series methods is developed. In addition, intervention analysis is used to analyze the sudden increase in the time-series process. The results show that the CPBA increased dramatically at the end of 2011. During that time, the CPBA increased by 16.0% in a two-month period to reach the peak value, but still stays 9.0% greater than the predicted level after the temporary effect gradually decays. By contrast, no significant fluctuation can be found in the conditional probability process of armed assault. It can be inferred that some social unrest, such as America's troop withdrawal from Afghanistan and Iraq, could have led to the increase of the CPBA in Afghanistan, Iraq, and Pakistan. The integrated time-series and intervention model is used to forecast the monthly CPBA in 2014 and through 2064. The average relative error compared with the real data in 2014 is 3.5%. The model is also applied to the total number of attacks recorded by the GTD between 2004 and 2014. © 2016 Society for Risk Analysis.

  18. Far-Field Acoustic Power Level and Performance Analyses of F31/A31 Open Rotor Model at Simulated Scaled Takeoff, Nominal Takeoff, and Approach Conditions: Technical Report I

    NASA Technical Reports Server (NTRS)

    Sree, Dave

    2015-01-01

    Far-field acoustic power level and performance analyses of open rotor model F31/A31 have been performed to determine its noise characteristics at simulated scaled takeoff, nominal takeoff, and approach flight conditions. The nonproprietary parts of the data obtained from experiments in 9- by 15-Foot Low-Speed Wind Tunnel (9?15 LSWT) tests were provided by NASA Glenn Research Center to perform the analyses. The tone and broadband noise components have been separated from raw test data by using a new data analysis tool. Results in terms of sound pressure levels, acoustic power levels, and their variations with rotor speed, angle of attack, thrust, and input shaft power have been presented and discussed. The effect of an upstream pylon on the noise levels of the model has been addressed. Empirical equations relating model's acoustic power level, thrust, and input shaft power have been developed. The far-field acoustic efficiency of the model is also determined for various simulated flight conditions. It is intended that the results presented in this work will serve as a database for comparison and improvement of other open rotor blade designs and also for validating open rotor noise prediction codes.

  19. An investigation on the effects of phase change material on material components used for high temperature thermal energy storage system

    NASA Astrophysics Data System (ADS)

    Kim, Taeil; Singh, Dileep; Zhao, Weihuan; Yua, Wenhua; France, David M.

    2016-05-01

    The latent heat thermal energy storage (LHTES) systems for concentrated solar power (CSP) plants with advanced power cycle require high temperature phase change materials (PCMs), Graphite foams with high thermal conductivity to enhance the poor thermal conductivity of PCMs. Brazing of the graphite foams to the structural metals of the LHTES system could be a method to assemble the system and a method to protect the structural metals from the molten salts. In the present study, the LHTES prototype capsules using MgCl2-graphite foam composites were assembled by brazing and welding, and tested to investigate the corrosion attack of the PCM salt on the BNi-4 braze. The microstructural analysis showed that the BNi-4 braze alloy can be used not only for the joining of structure alloy to graphite foams but also for the protecting of structure alloy from the corrosion by PCM.

  20. A wind tunnel investigation of the wake near the trailing edge of a deflected externally blown flap. [on a jet powered STOL transport aircraft

    NASA Technical Reports Server (NTRS)

    Johnson, W. G., Jr.; Kardas, G. E.

    1974-01-01

    The model tested was a general research model of a swept-wing, jet-powered STOL transport with externally blown flaps. The model was tested with four engine simulators mounted on pylons under the wing. Tests were conducted in the V/STOL tunnel over an angle of attack range of 0 deg to 16 deg and a thrust coefficient range from 0 to approximately 4 at a Reynolds number of 0.461 x 1 million based on the wing reference chord. The results of this investigation are presented primarily as plots of the individual velocity vectors obtained from the wake survey. These data are used to extend an earlier analysis to isolate the effects of the engine thrust on the behavior of the flow at the flap trailing edge. Results of a comparison with a jet-flap theory are also shown.

  1. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  2. Korean immigrants' knowledge of heart attack symptoms and risk factors.

    PubMed

    Hwang, Seon Y; Ryan, Catherine J; Zerwic, Julie Johnson

    2008-02-01

    This study assessed the knowledge of heart attack symptoms and risk factors in a convenience sample of Korean immigrants. A total of 116 Korean immigrants in a Midwestern metropolitan area were recruited through Korean churches and markets. Knowledge was assessed using both open-ended questions and a structured questionnaire. Latent class cluster analysis and Chi-square tests were used to analyze the data. About 76% of the sample had at least one self-reported risk factor for cardiovascular disease. Using an open-ended question, the majority of subjects could only identify one symptom. In the structured questionnaire, subjects identified a mean of 5 out of 10 heart attack symptoms and a mean of 5 out of 9 heart attack risk factors. Latent class cluster analysis showed that subjects clustered into two groups for both risk factors and symptoms: a high knowledge group and a low knowledge group. Subjects who clustered into the risk factor low knowledge group (48%) were more likely than the risk factor high knowledge group to be older than 65 years, to have lower education, to not know to use 911 when a heart attack occurred, and to not have a family history of heart attack. Korean immigrants' knowledge of heart attack symptoms and risk factors was variable, ranging from high to very low. Education should be focused on those at highest risk for a heart attack, which includes the elderly and those with risk factors.

  3. Sex differences in discriminative power of volleyball game-related statistics.

    PubMed

    João, Paulo Vicente; Leite, Nuno; Mesquita, Isabel; Sampaio, Jaime

    2010-12-01

    To identify sex differences in volleyball game-related statistics, the game-related statistics of several World Championships in 2007 (N=132) were analyzed using the software VIS from the International Volleyball Federation. Discriminant analysis was used to identify the game-related statistics which better discriminated performances by sex. Analysis yielded an emphasis on fault serves (SC = -.40), shot spikes (SC = .40), and reception digs (SC = .31). Specific robust numbers represent that considerable variability was evident in the game-related statistics profile, as men's volleyball games were better associated with terminal actions (errors of service), and women's volleyball games were characterized by continuous actions (in defense and attack). These differences may be related to the anthropometric and physiological differences between women and men and their influence on performance profiles.

  4. Outbreak patterns of the novel avian influenza (H7N9)

    NASA Astrophysics Data System (ADS)

    Pan, Ya-Nan; Lou, Jing-Jing; Han, Xiao-Pu

    2014-05-01

    The attack of novel avian influenza (H7N9) in East China caused a serious health crisis and public panic. In this paper, we empirically analyze the onset patterns of human cases of the novel avian influenza and observe several spatial and temporal properties that are similar to other infectious diseases. More specifically, using the empirical analysis and modeling studies, we find that the spatio-temporal network that connects the cities with human cases along the order of outbreak timing emerges two-regime-power-law edge-length distribution, indicating the picture that several islands with higher and heterogeneous risk straggle in East China. The proposed method is applicable to the analysis of the spreading situation in the early stage of disease outbreak using quite limited dataset.

  5. Known-plaintext attack on the double phase encoding and its implementation with parallel hardware

    NASA Astrophysics Data System (ADS)

    Wei, Hengzheng; Peng, Xiang; Liu, Haitao; Feng, Songlin; Gao, Bruce Z.

    2008-03-01

    A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.

  6. Free-Flight Investigation of the Static and Dynamic Longitudinal Stability Characteristics of 1/3.7-Scale Rocket-Powered Models of the Bell MX-776A

    NASA Technical Reports Server (NTRS)

    Michal, David H.

    1950-01-01

    An investigation of the static and dynamic longitudinal stability characteristics of 1/3.7 scale rocket-powered model of the Bell MX-776A has been made for a Mach number range from 0.8 to 1.6. Two models were tested with all control surfaces at 0 degree deflection and centers of gravity located 1/4 and 1/2 body diameters, respectively, ahead of the equivalent design location. Both models were stable about the trim conditions but did not trim at 0 degree angle of attack because of slight constructional asymmetries. The results indicated that the variation of lift and pitching moment was not linear with angle of attack. Both lift-curve slope and pitching-moment-curve slope were of the smallest magnitude near 0 degree angle of attack. In general, an increase in angle of attack was accompanied by a rearward movement of the aerodynamic center as the rear wing moved out of the downwash from the forward surfaces. This characteristic was more pronounced in the transonic region. The dynamic stability in the form of total damping factor varied with normal-force coefficient but was greatest for both models at a Mach number of approximately 1.25. The damping factor was greater at the lower trim normal-force coefficients except at a Mach number of 1.0. At that speed the damping factor was of about the same magnitude for both models. The drag coefficient increased with trim normal-force coefficient and was largest in the transonic region.

  7. Experimental Effects of Propulsive Jets and Afterbody Configurations on the Zero-lift Drag of Bodies of Revolution at a Mach Number of 1.59

    NASA Technical Reports Server (NTRS)

    De Moraes, Carlos A; Nowitzky, Albin M

    1954-01-01

    The present investigation was made at a free-stream Mach number of 1.59 to compare the afterbody drags to a series of conical boattailed models at zero angle of attack. Afterbody drags were obtained for both the power-off and the power-on conditions. Power-on drags were obtained as a function of afterbody fineness ratio, jet pressure ratio and divergence, and jet Mach number.

  8. Stress analysis of advanced attack helicopter composite main rotor blade root end lug

    NASA Technical Reports Server (NTRS)

    Baker, D. J.

    1982-01-01

    Stress analysis of the Advanced Attack Helicopter (AAH) composite main rotor blade root end lug is described. The stress concentration factor determined from a finite element analysis is compared to an empirical value used in the lug design. The analysis and test data indicate that the stress concentration is primarily a function of configuration and independent of the range of material properties typical of Kevlar-49/epoxy and glass epoxy.

  9. Defending the Power Grid from Hackers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eber, Kevin

    A new initiative underway at the National Renewable Energy Laboratory is intended to prevent hackers from gaining control of parts of the nation's power grid, potentially damaging electrical equipment and causing localized power outages. Our nation's power grid is evolving to be more responsive to changing power needs, more able to integrate renewable energy, more efficient, and more reliable. One key element of this evolution is adding communication and control devices to the power grid, closer to the end user, so that utilities have greater situational awareness of the grid and can respond quickly to disturbances. But these new devicesmore » and their communications requirements can also open up the power grid to potential cyber attacks.« less

  10. An adaptive neural swarm approach for intrusion defense in ad hoc networks

    NASA Astrophysics Data System (ADS)

    Cannady, James

    2011-06-01

    Wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are being increasingly deployed in critical applications due to the flexibility and extensibility of the technology. While these networks possess numerous advantages over traditional wireless systems in dynamic environments they are still vulnerable to many of the same types of host-based and distributed attacks common to those systems. Unfortunately, the limited power and bandwidth available in WSNs and MANETs, combined with the dynamic connectivity that is a defining characteristic of the technology, makes it extremely difficult to utilize traditional intrusion detection techniques. This paper describes an approach to accurately and efficiently detect potentially damaging activity in WSNs and MANETs. It enables the network as a whole to recognize attacks, anomalies, and potential vulnerabilities in a distributive manner that reflects the autonomic processes of biological systems. Each component of the network recognizes activity in its local environment and then contributes to the overall situational awareness of the entire system. The approach utilizes agent-based swarm intelligence to adaptively identify potential data sources on each node and on adjacent nodes throughout the network. The swarm agents then self-organize into modular neural networks that utilize a reinforcement learning algorithm to identify relevant behavior patterns in the data without supervision. Once the modular neural networks have established interconnectivity both locally and with neighboring nodes the analysis of events within the network can be conducted collectively in real-time. The approach has been shown to be extremely effective in identifying distributed network attacks.

  11. Cascade-based attacks on complex networks

    NASA Astrophysics Data System (ADS)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  12. On a simulation study for reliable and secured smart grid communications

    NASA Astrophysics Data System (ADS)

    Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei

    2015-05-01

    Demand response is one of key smart grid applications that aims to reduce power generation at peak hours and maintain a balance between supply and demand. With the support of communication networks, energy consumers can become active actors in the energy management process by adjusting or rescheduling their electricity usage during peak hours based on utilities pricing incentives. Nonetheless, the integration of communication networks expose the smart grid to cyber-attacks. In this paper, we developed a smart grid simulation test-bed and designed evaluation scenarios. By leveraging the capabilities of Matlab and ns-3 simulation tools, we conducted a simulation study to evaluate the impact of cyber-attacks on demand response application. Our data shows that cyber-attacks could seriously disrupt smart grid operations, thus confirming the need of secure and resilient communication networks for supporting smart grid operations.

  13. Improved decryption quality and security of a joint transform correlator-based encryption system

    NASA Astrophysics Data System (ADS)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  14. The World Trade Center attack. Observations from New York's Bellevue Hospital.

    PubMed

    Roccaforte, J D

    2001-12-01

    This report describes selected aspects of the response by Bellevue Hospital Center to the World Trade Center attack of 11 September 2001. The hospital is 2.5 miles (4 km) from the site of the attack. These first-hand observations and this analysis may aid in future preparations. Key issues described relate to communication, organization, injuries treated, staffing, and logistics.

  15. Radiological threat assessment and the Federal Response Plan--a gap analysis.

    PubMed

    Conklin, W Craig; Liotta, Philip L

    2005-11-01

    The ability of the federal government to effectively and efficiently respond to nuclear or radiological terrorist attacks has been the subject of intense discussion and analysis for many years. Because of recent terrorist activities and intelligence information, there is strong sentiment that it is not a question of if, but when, a radiological or nuclear terrorist attack will occur. As a result, there is considerable concern that the federal government may not be adequately prepared to respond to an attack involving a radiological dispersal device or improvised nuclear device. In response to these concerns, federal departments and agencies have initiated actions to develop a better understanding of the magnitude of the radiological/nuclear terrorist threat, assess the ability of the federal government to support state and local responses to such attacks, and improve the Nation's ability to prepare for, respond to, and recover from these types of attacks. In an era of limited fiscal growth and competing priorities, the federal government will have to enhance its collaboration with state and local governments, the private sector, and academia to ensure that the Nation is capable of responding to a terrorist attack involving radioactive or nuclear material.

  16. Aerodynamic interactions from reaction controls for lateral control of the M2-F2 lifting-body entry configuration at transonic and supersonic and supersonic Mach numbers. [wind tunnel tests

    NASA Technical Reports Server (NTRS)

    Bailey, R. O.; Brownson, J. J.

    1979-01-01

    Tests were conducted in the Ames 6 by 6 foot wind tunnel to determine the interaction of reaction jets for roll control on the M2-F2 lifting-body entry vehicle. Moment interactions are presented for a Mach number range of 0.6 to 1.7, a Reynolds number range of 1.2 x 10 to the 6th power to 1.6 x 10 to the 6th power (based on model reference length), an angle-of-attack range of -9 deg to 20 deg, and an angle-of-sideslip range of -6 deg to 6 deg at an angle of attack of 6 deg. The reaction jets produce roll control with small adverse yawing moment, which can be offset by horizontal thrust component of canted jets.

  17. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  18. Practical continuous-variable quantum key distribution without finite sampling bandwidth effects.

    PubMed

    Li, Huasheng; Wang, Chao; Huang, Peng; Huang, Duan; Wang, Tao; Zeng, Guihua

    2016-09-05

    In a practical continuous-variable quantum key distribution system, finite sampling bandwidth of the employed analog-to-digital converter at the receiver's side may lead to inaccurate results of pulse peak sampling. Then, errors in the parameters estimation resulted. Subsequently, the system performance decreases and security loopholes are exposed to eavesdroppers. In this paper, we propose a novel data acquisition scheme which consists of two parts, i.e., a dynamic delay adjusting module and a statistical power feedback-control algorithm. The proposed scheme may improve dramatically the data acquisition precision of pulse peak sampling and remove the finite sampling bandwidth effects. Moreover, the optimal peak sampling position of a pulse signal can be dynamically calibrated through monitoring the change of the statistical power of the sampled data in the proposed scheme. This helps to resist against some practical attacks, such as the well-known local oscillator calibration attack.

  19. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET

    PubMed Central

    Jen, Shang-Ming; Laih, Chi-Sung; Kuo, Wen-Chung

    2009-01-01

    MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA. PMID:22408566

  20. Vulnerability of network of networks

    NASA Astrophysics Data System (ADS)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  1. An Overview of Controls and Flying Qualities Technology on the F/A-18 High Alpha Research Vehicle

    NASA Technical Reports Server (NTRS)

    Pahle, Joseph W.; Wichman, Keith D.; Foster, John V.; Bundick, W. Thomas

    1996-01-01

    The NASA F/A-18 High Alpha Research Vehicle (HARV) has been the flight test bed of a focused technology effort to significantly increase maneuvering capability at high angles of attack. Development and flight test of control law design methodologies, handling qualities metrics, performance guidelines, and flight evaluation maneuvers are described. The HARV has been modified to include two research control effectors, thrust vectoring, and actuated forebody strakes in order to provide increased control power at high angles of attack. A research flight control system has been used to provide a flexible, easily modified capability for high-angle-of-attack research controls. Different control law design techniques have been implemented and flight-tested, including eigenstructure assignment, variable gain output feedback, pseudo controls, and model-following. Extensive piloted simulation has been used to develop nonlinear performance guide-lines and handling qualities criteria for high angles of attack. This paper reviews the development and evaluation of technologies useful for high-angle-of-attack control. Design, development, and flight test of the research flight control system, control laws, flying qualities specifications, and flight test maneuvers are described. Flight test results are used to illustrate some of the lessons learned during flight test and handling qualities evaluations.

  2. [Autonomic nervous function in patients with vertigo--evaluation for static function, variation and dynamic change using power spectral analysis of RR intervals].

    PubMed

    Seki, S

    1997-04-01

    Power spectral analysis of RR intervals (PSA) of 94 vertiginous patients with associated autonomic nervous dysfunction (AND group), 31 patients with vertebro-basilar insufficiency (VBI group) and 25 controls were analyzed in supine and upright positions. In addition static function, variation from the supine to the upright position and dynamic change in autonomic nervous function (ANF) from the supine to the upright position were examined. Heart rate was recorded for 120 seconds in the supine and 40 seconds in the upright position. RR intervals for each 20-second period were computed using FFT (Fast Fourier Transformation), and the ratio of low frequency power (0.05-0.15 Hz) to high frequency power (0.15-0.4 Hz) (L/H) of PSA were analyzed as an index of sympathetic activity. The PSA was examined by the following three parameters; L/H at rest during the 80-second period from 20 to 100 seconds (static function), the L/H variation between each 20-second period from 0 to 160 seconds (variation) and the ratio of L/H to that in the upright position (dynamic change). The results of PSA were compared with those of pulse wave velocity (PWV) and the coefficient of variation of the RR interval (CVRR), and association between attacks of vertigo and ANF was determined. The results of static function of PSA and the results of PWV and CVRR were very similar, indicating that both methods are useful for evaluating ANF in vertiginous patients. In the AND group the variation in sympathetic activity tended to be larger in patients with sympathetic hyperfunction and parasympathetic hypofunction and in the patients with sympathetic hypofunction and parasympathetic hyperfunction resulting from PWV and CVRR, than in the controls. The dynamic change in patients with sympathetic hyperfunction and parasympathetic hypofunction resulting from PWV and CVRR was also significantly lower than that in the controls (p < 0.01). Some patients in the AND group already showed excessive sympathetic hyperfunction at rest, and changing the position from supine to upright might trigger sympathetic hypofunction, causing an attack of vertigo. The PSA results in the VBI group were similar to those in the controls, suggesting that sympathetic dysfunction did not affect VBI induced vertigo.

  3. The World Trade Center Attack: Observations from New York's Bellevue Hospital

    PubMed Central

    Roccaforte, J David

    2001-01-01

    This report describes selected aspects of the response by Bellevue Hospital Center to the World Trade Center attack of 11 September 2001. The hospital is 2.5 miles (4 km) from the site of the attack. These first-hand observations and this analysis may aid in future preparations. Key issues described relate to communication, organization, injuries treated, staffing, and logistics. PMID:11737913

  4. Computational Investigation of a Boundary-Layer Ingesting Propulsion System for the Common Research Model

    NASA Technical Reports Server (NTRS)

    Blumenthal, Brennan T.; Elmiligui, Alaa; Geiselhart, Karl A.; Campbell, Richard L.; Maughmer, Mark D.; Schmitz, Sven

    2016-01-01

    The present paper examines potential propulsive and aerodynamic benefits of integrating a Boundary-Layer Ingestion (BLI) propulsion system into a typical commercial aircraft using the Common Research Model (CRM) geometry and the NASA Tetrahedral Unstructured Software System (TetrUSS). The Numerical Propulsion System Simulation (NPSS) environment is used to generate engine conditions for CFD analysis. Improvements to the BLI geometry are made using the Constrained Direct Iterative Surface Curvature (CDISC) design method. Previous studies have shown reductions of up to 25% in terms of propulsive power required for cruise for other axisymmetric geometries using the BLI concept. An analysis of engine power requirements, drag, and lift coefficients using the baseline and BLI geometries coupled with the NPSS model are shown. Potential benefits of the BLI system relating to cruise propulsive power are quantified using a power balance method, and a comparison to the baseline case is made. Iterations of the BLI geometric design are shown and any improvements between subsequent BLI designs presented. Simulations are conducted for a cruise flight condition of Mach 0.85 at an altitude of 38,500 feet and an angle of attack of 2 deg for all geometries. A comparison between available wind tunnel data, previous computational results, and the original CRM model is presented for model verification purposes along with full results for BLI power savings. Results indicate a 14.4% reduction in engine power requirements at cruise for the BLI configuration over the baseline geometry. Minor shaping of the aft portion of the fuselage using CDISC has been shown to increase the benefit from Boundary-Layer Ingestion further, resulting in a 15.6% reduction in power requirements for cruise as well as a drag reduction of eighteen counts over the baseline geometry.

  5. Computational Investigation of a Boundary-Layer Ingestion Propulsion System for the Common Research Model

    NASA Technical Reports Server (NTRS)

    Blumenthal, Brennan

    2016-01-01

    This thesis will examine potential propulsive and aerodynamic benefits of integrating a boundary-layer ingestion (BLI) propulsion system with a typical commercial aircraft using the Common Research Model geometry and the NASA Tetrahedral Unstructured Software System (TetrUSS). The Numerical Propulsion System Simulation (NPSS) environment will be used to generate engine conditions for CFD analysis. Improvements to the BLI geometry will be made using the Constrained Direct Iterative Surface Curvature (CDISC) design method. Previous studies have shown reductions of up to 25% in terms of propulsive power required for cruise for other axisymmetric geometries using the BLI concept. An analysis of engine power requirements, drag, and lift coefficients using the baseline and BLI geometries coupled with the NPSS model are shown. Potential benefits of the BLI system relating to cruise propulsive power are quantified using a power balance method and a comparison to the baseline case is made. Iterations of the BLI geometric design are shown and any improvements between subsequent BLI designs presented. Simulations are conducted for a cruise flight condition of Mach 0.85 at an altitude of 38,500 feet and an angle of attack of 2deg for all geometries. A comparison between available wind tunnel data, previous computational results, and the original CRM model is presented for model verification purposes along with full results for BLI power savings. Results indicate a 14.3% reduction in engine power requirements at cruise for the BLI configuration over the baseline geometry. Minor shaping of the aft portion of the fuselage using CDISC has been shown to increase the benefit from boundary-layer ingestion further, resulting in a 15.6% reduction in power requirements for cruise as well as a drag reduction of eighteen counts over the baseline geometry.

  6. A Taxonomy of Attacks on the DNP3 Protocol

    NASA Astrophysics Data System (ADS)

    East, Samuel; Butts, Jonathan; Papa, Mauricio; Shenoi, Sujeet

    Distributed Network Protocol (DNP3) is the predominant SCADA protocol in the energy sector - more than 75% of North American electric utilities currently use DNP3 for industrial control applications. This paper presents a taxonomy of attacks on the protocol. The attacks are classified based on targets (control center, outstation devices and network/communication paths) and threat categories (interception, interruption, modification and fabrication). To facilitate risk analysis and mitigation strategies, the attacks are associated with the specific DNP3 protocol layers they exploit. Also, the operational impact of the attacks is categorized in terms of three key SCADA objectives: process confi- dentiality, process awareness and process control. The attack taxonomy clarifies the nature and scope of the threats to DNP3 systems, and can provide insights into the relative costs and benefits of implementing mitigation strategies.

  7. Network model of bilateral power markets based on complex networks

    NASA Astrophysics Data System (ADS)

    Wu, Yang; Liu, Junyong; Li, Furong; Yan, Zhanxin; Zhang, Li

    2014-06-01

    The bilateral power transaction (BPT) mode becomes a typical market organization with the restructuring of electric power industry, the proper model which could capture its characteristics is in urgent need. However, the model is lacking because of this market organization's complexity. As a promising approach to modeling complex systems, complex networks could provide a sound theoretical framework for developing proper simulation model. In this paper, a complex network model of the BPT market is proposed. In this model, price advantage mechanism is a precondition. Unlike other general commodity transactions, both of the financial layer and the physical layer are considered in the model. Through simulation analysis, the feasibility and validity of the model are verified. At same time, some typical statistical features of BPT network are identified. Namely, the degree distribution follows the power law, the clustering coefficient is low and the average path length is a bit long. Moreover, the topological stability of the BPT network is tested. The results show that the network displays a topological robustness to random market member's failures while it is fragile against deliberate attacks, and the network could resist cascading failure to some extent. These features are helpful for making decisions and risk management in BPT markets.

  8. 32 CFR 185.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Government, including workforce, food and water, health resources, industrial production, housing and... of a nuclear attack. CARDA integrates the combined resources of all government agencies and Military... President in declaring that extant circumstances and risks justify his implementation of the legal powers...

  9. Dynamic load indicators for take-off-landing sequence in blocks and attacks of elite female volleyball players.

    PubMed

    Kabaciński, Jarosław; Dworak, Lechosław Bogdan; Murawa, Michał; Rzepnicka, Agata

    2016-01-01

    Dynamic loads during landings determined by the ground reaction forces (GRFs) may elaborate internal loads and increase the risk of overload knee injuries as a result of performing volleyball jumps many times. The study dealt with a biomechanical assessment of dynamic load indicators in female volleyball players for the motion sequence of take-off-landing in blocks and attacks. Twelve professional female volleyball players participated in the study. Blocks and attacks were filmed by two cameras. GRFs vs. time graphs were recorded with the use of a force platform. Values of dynamic load indicators in terms of the relations of peak of vertical component of GRF, build-up index of this force (BIF), and power output (P) during landing to the vGRF, BIF and P during take-off (L/T) were calculated. The statistically significant ( p < 0.05) highest values of L/T indicators were found for back row attack spikes: 2.4 (vGRF), 12.2 (BIF) and 3.1 (P). In the case of blocks, slide attack spikes and attack line spikes, results of these variables were in range: 1.8÷2.1, 5.9÷7.6 and 2.1÷2.9, respectively. The reduction of GRFs during landings contributes to decreasing the level of the load indicators L/T which should minimize the incidence of anterior cruciate ligament and patellar tendon injuries in female volleyball players.

  10. Network Robustness: the whole story

    NASA Astrophysics Data System (ADS)

    Longjas, A.; Tejedor, A.; Zaliapin, I. V.; Ambroj, S.; Foufoula-Georgiou, E.

    2014-12-01

    A multitude of actual processes operating on hydrological networks may exhibit binary outcomes such as clean streams in a river network that may become contaminated. These binary outcomes can be modeled by node removal processes (attacks) acting in a network. Network robustness against attacks has been widely studied in fields as diverse as the Internet, power grids and human societies. However, the current definition of robustness is only accounting for the connectivity of the nodes unaffected by the attack. Here, we put forward the idea that the connectivity of the affected nodes can play a crucial role in proper evaluation of the overall network robustness and its future recovery from the attack. Specifically, we propose a dual perspective approach wherein at any instant in the network evolution under attack, two distinct networks are defined: (i) the Active Network (AN) composed of the unaffected nodes and (ii) the Idle Network (IN) composed of the affected nodes. The proposed robustness metric considers both the efficiency of destroying the AN and the efficiency of building-up the IN. This approach is motivated by concrete applied problems, since, for example, if we study the dynamics of contamination in river systems, it is necessary to know both the connectivity of the healthy and contaminated parts of the river to assess its ecological functionality. We show that trade-offs between the efficiency of the Active and Idle network dynamics give rise to surprising crossovers and re-ranking of different attack strategies, pointing to significant implications for decision making.

  11. Efficacy of Noninvasive Brain Stimulation on Pain Control in Migraine Patients: A Systematic Review and Meta-Analysis.

    PubMed

    Shirahige, Lívia; Melo, Lorena; Nogueira, Fernanda; Rocha, Sérgio; Monte-Silva, Kátia

    2016-11-01

    To evaluate the efficacy of noninvasive brain stimulation (NIBS) on pain control in migraine patients. Recent studies have used NIBS as an abortive and prophylactic treatment for migraine; however, its efficacy regarding meaningful clinical effects remains to be critically analyzed. Systematic review of controlled clinical trials. Searches were conducted in six databases: MEDLINE (via PubMed), LILACS (via BIREME), CINAHL (via EBSCO), Scopus (via EBSCO), Web of Science, and CENTRAL. Two independent authors searched for randomized controlled clinical trials published through until January 2016 that involved the use of transcranial direct current stimulation (tDCS) and transcranial magnetic stimulation (TMS) in migraineurs. Studies which met the eligibility criteria were assessed and methodological quality was examined using the Cochrane tool for assessing risk of bias. Information about pain intensity (primary outcome), migraine attacks, painkiller intake, and adverse effects were extracted. Eight studies were included in the quantitative analysis with 153 migraine patients that received NIBS and 143 sham NIBS. In overall meta-analysis, we did not find significant results for pain intensity (SMD: -0.61; CI: -1.35 to 0.13; P = .11), for migraine attacks (SMD: -0.44; 95%; CI: -1.15 to 0.26; P = .22), and for painkiller intake (SMD: -0.57; 95% CI: -1.21 to 0.07; P = .08). However, subgroup analysis considering only tDCS effects have demonstrated a decrease for pain intensity (SMD: -0.91; 95% CI: -1.79 to -0.03; P = .04), migraine attacks (SMD: -0.75; 95% CI: -1.25 to -0.24; P = .004), and painkiller intake (SMD: -0.64; 95% CI: -1.21 to -0.07; P = .03). Subgroup analysis for TMS did not reveal significant effects for any outcome. Low or very low quality of evidence suggests that our primary outcome evaluation failed to find support for the superiority of NIBS over sham treatment. Although, subgroup analysis reveals that tDCS have moderate to high effects and could be a promising nonpharmacological alternative to pain control, mainly for painkiller intake reduction. However, there is a need for larger controlled trials with methodological rigor, which could increase the power of result inference. © 2016 American Headache Society.

  12. Numerical analysis of flow interaction of turbine system in two-stage turbocharger of internal combustion engine

    NASA Astrophysics Data System (ADS)

    Liu, Y. B.; Zhuge, W. L.; Zhang, Y. J.; Zhang, S. Y.

    2016-05-01

    To reach the goal of energy conservation and emission reduction, high intake pressure is needed to meet the demand of high power density and high EGR rate for internal combustion engine. Present power density of diesel engine has reached 90KW/L and intake pressure ratio needed is over 5. Two-stage turbocharging system is an effective way to realize high compression ratio. Because turbocharging system compression work derives from exhaust gas energy. Efficiency of exhaust gas energy influenced by design and matching of turbine system is important to performance of high supercharging engine. Conventional turbine system is assembled by single-stage turbocharger turbines and turbine matching is based on turbine MAP measured on test rig. Flow between turbine system is assumed uniform and value of outlet physical quantities of turbine are regarded as the same as ambient value. However, there are three-dimension flow field distortion and outlet physical quantities value change which will influence performance of turbine system as were demonstrated by some studies. For engine equipped with two-stage turbocharging system, optimization of turbine system design will increase efficiency of exhaust gas energy and thereby increase engine power density. However flow interaction of turbine system will change flow in turbine and influence turbine performance. To recognize the interaction characteristics between high pressure turbine and low pressure turbine, flow in turbine system is modeled and simulated numerically. The calculation results suggested that static pressure field at inlet to low pressure turbine increases back pressure of high pressure turbine, however efficiency of high pressure turbine changes little; distorted velocity field at outlet to high pressure turbine results in swirl at inlet to low pressure turbine. Clockwise swirl results in large negative angle of attack at inlet to rotor which causes flow loss in turbine impeller passages and decreases turbine efficiency. However negative angle of attack decreases when inlet swirl is anti-clockwise and efficiency of low pressure turbine can be increased by 3% compared to inlet condition of clockwise swirl. Consequently flow simulation and analysis are able to aid in figuring out interaction mechanism of turbine system and optimizing turbine system design.

  13. Random Visitor: Defense against Identity Attacks in P2P Networks

    NASA Astrophysics Data System (ADS)

    Gu, Jabeom; Nah, Jaehoon; Kwon, Hyeokchan; Jang, Jonsoo; Park, Sehyun

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  14. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  15. The Seasonality of Acute Attack of Primary Angle-Closure Glaucoma in Beijing, China.

    PubMed

    Zhu, Jingyuan; Xu, Yang; Wang, Hongyuan; Liu, Dongjing; Zhu, Jingbo; Wu, Huijuan

    2018-03-05

    In this study, the seasonality of acute attack of primary angle-closure glaucoma (PACG) was analysed. This retrospective case series included 283 patients (200 women, 83 men; mean age, 68.2 ± 10.3 years; range, 37-96 years) with acute attack of PACG from a university-based clinic over 4 years. Patients' age and sex, and the date and season of onset of PACG attack, were analysed. Descriptive analysis and von Mises distribution were used for statistical analysis. The highest incidence of acute attack of PACG was observed in those aged 60-69 years (34.6%). Descriptive analysis showed that the incidence was greater in June and July for men, November for women, and November for the entire sample. An angular plot (using von Mises distribution) of the individual dates of onset revealed the estimated peak onset on September 11, November 8, and October 28 for men, women, and both, respectively. Integration of the results from the two analyses revealed the incidence to be higher in the summer and winter for men, and in the winter for women and for the entire sample. More females than males were affected. Monthly and seasonal variations in onset were observed, which might be related to weather changes.

  16. Effect of twist and camber on the low-speed aerodynamic characteristics of a powered close-coupled wing-canard configuration

    NASA Technical Reports Server (NTRS)

    Paulson, J. W., Jr.; Thomas, J. L.

    1978-01-01

    A series of wind-tunnel tests were conducted in a V/STOL tunnel to determine the low-speed longitudinal aerodynamic characteristics of a powered close-coupled wing/canard fighter configuration. The data was obtained for a high angle-of-attack maneuvering configuration and a takeoff and landing configuration. The data presented in tabulated form are intended for reference purposes.

  17. A density functional theory study of the role of functionalized graphene particles as effective additives in power cable insulation

    PubMed Central

    Song, Shuwei; Zhao, Hong; Zheng, Xiaonan; Zhang, Hui; Wang, Ying; Han, Baozhong

    2018-01-01

    The role of a series of functionalized graphene additives in power cable insulation in suppressing the growth of electrical treeing and preventing the degradation of the polymer matrix has been investigated by density functional theory calculations. Bader charge analysis indicates that pristine, doped or defect graphene could effectively capture hot electrons to block their attack on cross-linked polyethylene (XLPE) because of the π–π conjugated unsaturated structures. Further exploration of the electronic properties in the interfacial region between the additives and XLPE shows that N-doped single-vacancy graphene, graphene oxide and B-, N-, Si- or P-doped graphene oxide have relatively strong physical interaction with XLPE to restrict its mobility and rather weak chemical activity to prevent the cleavage of the C–H or C–C bond, suggesting that they are all potential candidates as effective additives. The understanding of the features of functionalized graphene additives in trapping electrons and interfacial interaction will assist in the screening of promising additives as voltage stabilizers in power cables. PMID:29515821

  18. A density functional theory study of the role of functionalized graphene particles as effective additives in power cable insulation.

    PubMed

    Song, Shuwei; Zhao, Hong; Zheng, Xiaonan; Zhang, Hui; Liu, Yang; Wang, Ying; Han, Baozhong

    2018-02-01

    The role of a series of functionalized graphene additives in power cable insulation in suppressing the growth of electrical treeing and preventing the degradation of the polymer matrix has been investigated by density functional theory calculations. Bader charge analysis indicates that pristine, doped or defect graphene could effectively capture hot electrons to block their attack on cross-linked polyethylene (XLPE) because of the π-π conjugated unsaturated structures. Further exploration of the electronic properties in the interfacial region between the additives and XLPE shows that N-doped single-vacancy graphene, graphene oxide and B-, N-, Si- or P-doped graphene oxide have relatively strong physical interaction with XLPE to restrict its mobility and rather weak chemical activity to prevent the cleavage of the C-H or C-C bond, suggesting that they are all potential candidates as effective additives. The understanding of the features of functionalized graphene additives in trapping electrons and interfacial interaction will assist in the screening of promising additives as voltage stabilizers in power cables.

  19. Robustness analysis of interdependent networks under multiple-attacking strategies

    NASA Astrophysics Data System (ADS)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  20. Toward more environmentally resistant gas turbines: Progress in NASA-Lewis programs

    NASA Technical Reports Server (NTRS)

    Lowell, C. E.; Grisaffe, S. J.; Levine, S. R.

    1976-01-01

    A wide range of programs are being conducted for improving the environmental resistance to oxidation and hot corrosion of gas turbine and power system materials. They range from fundamental efforts to delineate attack mechanisms, allow attack modeling and permit life prediction, to more applied efforts to develop potentially more resistant alloys and coatings. Oxidation life prediction efforts have resulted in a computer program which provides an initial method for predicting long time metal loss using short time oxidation data by means of a paralinear attack model. Efforts in alloy development have centered on oxide-dispersion strengthened alloys based on the Ni-Cr-Al system. Compositions have been identified which are compromises between oxidation and thermal fatigue resistance. Fundamental studies of hot corrosion mechanisms include thermodynamic studies of sodium sulfate formation during turbine combustion. Information concerning species formed during the vaporization of Na2SO4 has been developed using high temperature mass spectrometry.

  1. An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Yifu; Mendis, Gihan J.; He, Youbiao

    In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complementmore » the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less

  2. A Targeted Attack For Enhancing Resiliency of Intelligent Intrusion Detection Modules in Energy Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Youssef, Tarek; El Hariri, Mohammad; Habib, Hani

    Abstract— Secure high-speed communication is required to ensure proper operation of complex power grid systems and prevent malicious tampering activities. In this paper, artificial neural networks with temporal dependency are introduced for false data identification and mitigation for broadcasted IEC 61850 SMV messages. The fast responses of such intelligent modules in intrusion detection make them suitable for time- critical applications, such as protection. However, care must be taken in selecting the appropriate intelligence model and decision criteria. As such, this paper presents a customizable malware script to sniff and manipulate SMV messages and demonstrates the ability of the malware tomore » trigger false positives in the neural network’s response. The malware developed is intended to be as a vaccine to harden the intrusion detection system against data manipulation attacks by enhancing the neural network’s ability to learn and adapt to these attacks.« less

  3. Noise of a simulated installed model counterrotation propeller at angle-of-attack and takeoff/approach conditions

    NASA Technical Reports Server (NTRS)

    Woodward, Richard P.

    1990-01-01

    Acoustic results for two model counterrotation propellers are presented. The propellers were tested over a range of rotational speeds and propeller axis angles of attack in both the baseline configuration and the installed configuration consisting of a simulated upstream nacelle support pylon and fuselage section. Acoustic data were taken with a polar microphone probe attached to the downstream propeller housing, capable of surveying directivities at several azimuthal locations. The forward and aft rotor power coefficients and fundamental rotor-alone tone levels are found to be directly controlled by propeller axis angle of attack. The second-order rotor-alone tones are strongly influenced by the upstream pylon wake at 80 percent speed; however, rotor-alone mechanisms control the tone level at 90 percent speed, while rotor-rotor interaction tones are essentially unaffected by the presence of the simulated installation.

  4. Protecting Database Centric Web Services against SQL/XPath Injection Attacks

    NASA Astrophysics Data System (ADS)

    Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique

    Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.

  5. A Bitslice Implementation of Anderson's Attack on A5/1

    NASA Astrophysics Data System (ADS)

    Bulavintsev, Vadim; Semenov, Alexander; Zaikin, Oleg; Kochemazov, Stepan

    2018-03-01

    The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson's Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessing the computing power of modern Graphics Processing Units (GPUs). As a result, using commonly available GPUs this method can quite efficiently recover the secret key using only 64 bits of keystream. To test the performance of the implementation, a volunteer computing project was launched. 10 instances of A5/1 cryptanalysis have been successfully solved in this project in a single week.

  6. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  7. Notes on a Continuous-Variable Quantum Key Distribution Scheme

    NASA Astrophysics Data System (ADS)

    Ichikawa, Tsubasa; Hirano, Takuya; Matsubara, Takuto; Ono, Motoharu; Namiki, Ryo

    2017-09-01

    We develop a physical model to describe the signal transmission for a continuous-variable quantum key distribution scheme and investigate its security against a couple of eavesdropping attacks assuming that the eavesdropper's power is partly restricted owing to today's technological limitations. We consider an eavesdropper performing quantum optical homodyne measurement on the signal obtained by a type of beamsplitting attack. We also consider the case in which the eavesdropper Eve is unable to access a quantum memory and she performs heterodyne measurement on her signal without performing a delayed measurement. Our formulation includes a model in which the receiver's loss and noise are unaccessible by the eavesdropper. This setup enables us to investigate the condition that Eve uses a practical fiber differently from the usual beamsplitting attack where she can deploy a lossless transmission channel. The secret key rates are calculated in both the direct and reverse reconciliation scenarios.

  8. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

    PubMed

    Park, Namje; Kang, Namhi

    2015-12-24

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  9. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  10. Operational Energy Capability Portfolio Analysis for Protection of Maritime Forces Against Small Boat Swarms

    DTIC Science & Technology

    2016-09-01

    asymmetric threat’s attack? C. SURVEY OF RECENT STUDIES A survey of extensive studies on countering small boat attacks from different perspectives... studies capability factors that were important in enhancing coastal defense for the Campeche Sound and Israeli coast, respectively. On better...countering small boat swarm attacks utilizing ASCMs. Previous studies focus solely on force protection effectiveness. This thesis addresses this gap. D

  11. The effect of climate variability on urinary stone attacks: increased incidence associated with temperature over 18 °C: a population-based study.

    PubMed

    Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo

    2015-02-01

    The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.

  12. Towards improved migraine management: Determining potential trigger factors in individual patients.

    PubMed

    Peris, Francesc; Donoghue, Stephen; Torres, Ferran; Mian, Alec; Wöber, Christian

    2017-04-01

    Background Certain chronic diseases such as migraine result in episodic, debilitating attacks for which neither cause nor timing is well understood. Historically, possible triggers were identified through analysis of aggregated data from populations of patients. However, triggers common in populations may not be wholly responsible for an individual's attacks. To explore this hypothesis we developed a method to identify individual 'potential trigger' profiles and analysed the degree of inter-individual variation. Methods We applied N = 1 statistical analysis to a 326-migraine-patient database from a study in which patients used paper-based diaries for 90 days to track 33 factors (potential triggers or premonitory symptoms) associated with their migraine attacks. For each patient, univariate associations between factors and migraine events were analysed using Cox proportional hazards models. Results We generated individual factor-attack association profiles for 87% of the patients. The average number of factors associated with attacks was four per patient: Factor profiles were highly individual and were unique in 85% of patients with at least one identified association. Conclusion Accurate identification of individual factor-attack profiles is a prerequisite for testing which are true triggers and for development of trigger avoidance or desensitisation strategies. Our methodology represents a necessary development toward this goal.

  13. Real-time network security situation visualization and threat assessment based on semi-Markov process

    NASA Astrophysics Data System (ADS)

    Chen, Junhua

    2013-03-01

    To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.

  14. Known-plaintext attack on a joint transform correlator encrypting system.

    PubMed

    Barrera, John Fredy; Vargas, Carlos; Tebaldi, Myrian; Torroba, Roberto; Bolognini, Nestor

    2010-11-01

    We demonstrate in this Letter that a joint transform correlator shows vulnerability to known-plaintext attacks. An unauthorized user, who intercepts both an object and its encrypted version, can obtain the security key code mask. In this contribution, we conduct a hybrid heuristic attack scheme merge to a Gerchberg-Saxton routine to estimate the encrypting key to decode different ciphertexts encrypted with that same key. We also analyze the success of this attack for different pairs of plaintext-ciphertext used to get the encrypting code. We present simulation results for the decrypting procedure to demonstrate the validity of our analysis.

  15. A rare case of recurrent vasodepressive attacks of 2-hours duration: analysis of the mechanism by muscle sympathetic nerve activity recording.

    PubMed

    Yatomi, A; Iguchi, A; Uemura, K; Sakamoto, N; Iwase, S; Mano, T

    1989-03-01

    Muscle sympathetic nerve activity was recorded in a 57-year-old male patient suffering from severe hypotensive attacks with bradycardia for 10 years. Continuous blood pressure recording demonstrated frequent drastic falls in pressure. Disappearance and reappearance of muscle sympathetic nerve activity coincided with the onset and termination of attacks. Awakening from sleep or emotional and/or cardiovascular stress seems to trigger hypotension. Cardiac pacemaker was not useful in limiting the attack, because right ventricular pacing caused abrupt falls in both blood pressure and heart rate.

  16. Computer Security for the Computer Systems Manager.

    DTIC Science & Technology

    1982-12-01

    power sources essential to system availabilit y. Environsental degradation can cause system collapse or simply make the arer uncomforable work in...attack (civil disobedience, military as- sault, arson, locting, sabotage, vanlilism) * fire • smoke, dust, and dirt intrusion * bursting water pipes

  17. Pitch and Yaw Trajectory Measurement Comparison Between Automated Video Analysis and Onboard Sensor Data Analysis Techniques

    DTIC Science & Technology

    2013-09-01

    ORGANIZATION REPORT NUMBER ARL-TR-6576 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11 . SPONSOR... 11 Figure 11 . Estimated angle-of-attack components history, projectile no.2... 11 Figure 12. Comparison of angle-of-attack component estimates, projectile no.2. ........................12 Figure 13. Total angle-of

  18. 76 FR 26729 - Ceridian Corporation; Analysis of Proposed Consent Order to Aid Public Comment

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... result of these failures, hackers executed an SQL injection attack on the Powerpay Web site and Web application. Through this attack, the hackers found personal information stored in Powerpay on Ceridian's...

  19. Proximal detection of energetic materials on fabrics by UV-Raman spectroscopy

    NASA Astrophysics Data System (ADS)

    Chirico, R.; Almaviva, S.; Colao, F.; Fiorani, L.; Nuvoli, M.; Schweikert, W.; Schnürer, F.; Cassioli, L.; Grossi, S.; Mariani, L.; Angelini, F.; Menicucci, I.; Palucci, A.

    2014-05-01

    In the last decades there have been several terroristic attacks with improvised explosive devices (IED) that have raised the need for new instrumentation, for homeland security applications, to obtain a reliable and effective fight against terrorism. Public transportation has been around for about 150 years, but terroristic attacks against buses, trains, subways, etc., is a relatively recent phenomenon [1]. Since 1970, transportation has been an increasingly attractive target for terrorists. Most of the attacks to transport infrastructures take place in countries where public transportation is the primary way to move. Terrorists prefer to execute a smaller-scale attack with certainty of success rather than a complex and demanding operation to cause massive death and destruction. [1]. Many commonly available materials, such as fertilizer, gunpowder, and hydrogen peroxide, can be used as explosives and other materials, such as nails, glass, or metal fragments, can be used to increase the amount of shrapnel propelled by the explosion. The majority of substances that are classified as chemical explosives generally contain oxygen, nitrogen and oxidable elements such as carbon and hydrogen [2]. The most common functional group in military explosives is NO2. That functionality can be attached to oxygen (ONO2) in the nitrate esters (PETN), to carbon (C-NO2) in the nitroarenes (TNT) and nitroalkanes (Nitromethane), and to nitrogen (N-NO2) as in the nitramines (RDX). Some organic peroxides, such as TATP and HMTD, are popular amongst terrorists because they are powerful initiators that can be easily prepared from easily available ingredients. Azides are also powerful primary explosives commonly used as initiators (commercial detonators) in civilian and military operations, therefore they could be potentially used by terrorists as initiators for IEDs.

  20. Major depressive disorder with anger attacks and cardiovascular risk factors.

    PubMed

    Fraguas, Renerio; Iosifescu, Dan V; Bankier, Bettina; Perlis, Roy; Clementi-Craven, Nicoletta; Alpert, Jonathan; Fava, Maurizio

    2007-01-01

    Depression and anger have been separately associated with cardiovascular risk factors. We investigated if major depressive disorder (MDD) with concomitant anger attacks was associated with cardiovascular risk factors. We measured total serum cholesterol, glycemia, resting blood pressure, and smoking parameters in 333 (52.9% women) MDD nonpsychotic outpatients, mean age of 39.4 years. MDD was diagnosed with the Structured Clinical Interview (SCID) in accordance with the Diagnostic and Statistic Manual of Mental Disorders, Third Edition, Revised (DSM-III-R). The presence of anger attacks was established with the Massachusetts General Hospital Anger Attacks Questionnaire. In a logistic regression analysis, anger attacks were independently associated with cholesterol levels > or = 200 mg/dL (odds ratio [OR], 2.16; 95% confidence interval [CI], 1.18-3.94) and years of smoking > 11 (OR, 2.59; 95% CI, 1.32-5.04). MDD with anger attacks was significantly associated with increased cholesterol levels and years of smoking.

  1. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  2. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  3. Legislation Seeks to Protect Power Grid From Space Weather

    NASA Astrophysics Data System (ADS)

    Tretkoff, Ernie

    2010-05-01

    Proposed legislation would help protect the U.S. power grid against space weather and other threats. The Grid Reliability and Infrastructure Defense Act (GRID Act) would give the Federal Energy Regulatory Commission (FERC) authority to develop and enforce standards for power companies to protect the electric grid from geomagnetic storms and threats such as a terrorist attack using electromagnetic pulse (EMP) weapons. The act unanimously passed the U.S. House Committee on Energy and Commerce in April and will proceed to a vote in the full House of Representatives.

  4. A high-quality high-fidelity visualization of the September 11 attack on the World Trade Center.

    PubMed

    Rosen, Paul; Popescu, Voicu; Hoffmann, Christoph; Irfanoglu, Ayhan

    2008-01-01

    In this application paper, we describe the efforts of a multidisciplinary team towards producing a visualization of the September 11 Attack on the North Tower of New York's World Trade Center. The visualization was designed to meet two requirements. First, the visualization had to depict the impact with high fidelity, by closely following the laws of physics. Second, the visualization had to be eloquent to a nonexpert user. This was achieved by first designing and computing a finite-element analysis (FEA) simulation of the impact between the aircraft and the top 20 stories of the building, and then by visualizing the FEA results with a state-of-the-art commercial animation system. The visualization was enabled by an automatic translator that converts the simulation data into an animation system 3D scene. We built upon a previously developed translator. The translator was substantially extended to enable and control visualization of fire and of disintegrating elements, to better scale with the number of nodes and number of states, to handle beam elements with complex profiles, and to handle smoothed particle hydrodynamics liquid representation. The resulting translator is a powerful automatic and scalable tool for high-quality visualization of FEA results.

  5. Kinematic control of aerodynamic forces on an inclined flapping wing with asymmetric strokes.

    PubMed

    Park, Hyungmin; Choi, Haecheon

    2012-03-01

    In the present study, we conduct an experiment using a one-paired dynamically scaled model of an insect wing, to investigate how asymmetric strokes with different wing kinematic parameters are used to control the aerodynamics of a dragonfly-like inclined flapping wing in still fluid. The kinematic parameters considered are the angles of attack during the mid-downstroke (α(md)) and mid-upstroke (α(mu)), and the duration (Δτ) and time of initiation (τ(p)) of the pitching rotation. The present dragonfly-like inclined flapping wing has the aerodynamic mechanism of unsteady force generation similar to those of other insect wings in a horizontal stroke plane, but the detailed effect of the wing kinematics on the force control is different due to the asymmetric use of the angle of attack during the up- and downstrokes. For example, high α(md) and low α(mu) produces larger vertical force with less aerodynamic power, and low α(md) and high α(mu) is recommended for horizontal force (thrust) production. The pitching rotation also affects the aerodynamics of a flapping wing, but its dynamic rotational effect is much weaker than the effect from the kinematic change in the angle of attack caused by the pitching rotation. Thus, the influences of the duration and timing of pitching rotation for the present inclined flapping wing are found to be very different from those for a horizontal flapping wing. That is, for the inclined flapping motion, the advanced and delayed rotations produce smaller vertical forces than the symmetric one and the effect of pitching duration is very small. On the other hand, for a specific range of pitching rotation timing, delayed rotation requires less aerodynamic power than the symmetric rotation. As for the horizontal force, delayed rotation with low α(md) and high α(mu) is recommended for long-duration flight owing to its high efficiency, and advanced rotation should be employed for hovering flight for nearly zero horizontal force. The present study suggests that manipulating the angle of attack during a flapping cycle is the most effective way to control the aerodynamic forces and corresponding power expenditure for a dragonfly-like inclined flapping wing.

  6. Disparities in adult African American women's knowledge of heart attack and stroke symptomatology: an analysis of 2003-2005 Behavioral Risk Factor Surveillance Survey data.

    PubMed

    Lutfiyya, May Nawal; Cumba, Marites T; McCullough, Joel Emery; Barlow, Erika Laverne; Lipsky, Martin S

    2008-06-01

    Heart disease and stroke are the first and third leading causes of death of American women, respectively. African American women experience a disproportionate burden of these diseases compared with Caucasian women and are also more likely to delay seeking treatment for acute symptoms. As knowledge is a first step in seeking care, this study examined the knowledge of heart attack and stroke symptoms among African American women. This was a cross-sectional study analyzing 2003-2005 Behavioral Risk Factor Surveillance Survey (BRFSS) data. A composite heart attack and stroke knowledge score was computed for each respondent from the 13 heart attack and stroke symptom knowledge questions. Multivariate logistic regression was performed using low scores on the heart attack and stroke knowledge questions as the dependent variable. Twenty percent of the respondents were low scorers, and 23.8% were high scorers. Logistic regression analysis showed that adult African American women who earned low scores on the composite heart attack and stroke knowledge questions (range 0-8 points) were more likely to be aged 18-34 (OR = 1.36, CI 1.35, 1.37), be uninsured (OR = 1.32, CI 1.31, 1.33), have an annual household income <$35,000 (OR = 1.46, CI 1.45, 1.47), and have a primary healthcare provider (OR = 1.22, CI 1.20, 1.23). The findings indicated that knowledge of heart attack and stroke symptoms varied significantly among African American women, depending on socioeconomic variables. Targeting interventions to African American women, particularly those in lower socioeconomic groups, may increase knowledge of heart attack and stroke symptoms, subsequently improving preventive action taken in response to these conditions.

  7. Modeling Cyber Conflicts Using an Extended Petri Net Formalism

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zakrzewska, Anita N; Ferragut, Erik M

    2011-01-01

    When threatened by automated attacks, critical systems that require human-controlled responses have difficulty making optimal responses and adapting protections in real- time and may therefore be overwhelmed. Consequently, experts have called for the development of automatic real-time reaction capabilities. However, a technical gap exists in the modeling and analysis of cyber conflicts to automatically understand the repercussions of responses. There is a need for modeling cyber assets that accounts for concurrent behavior, incomplete information, and payoff functions. Furthermore, we address this need by extending the Petri net formalism to allow real-time cyber conflicts to be modeled in a way thatmore » is expressive and concise. This formalism includes transitions controlled by players as well as firing rates attached to transitions. This allows us to model both player actions and factors that are beyond the control of players in real-time. We show that our formalism is able to represent situational aware- ness, concurrent actions, incomplete information and objective functions. These factors make it well-suited to modeling cyber conflicts in a way that allows for useful analysis. MITRE has compiled the Common Attack Pattern Enumera- tion and Classification (CAPEC), an extensive list of cyber attacks at various levels of abstraction. CAPEC includes factors such as attack prerequisites, possible countermeasures, and attack goals. These elements are vital to understanding cyber attacks and to generating the corresponding real-time responses. We demonstrate that the formalism can be used to extract precise models of cyber attacks from CAPEC. Several case studies show that our Petri net formalism is more expressive than other models, such as attack graphs, for modeling cyber conflicts and that it is amenable to exploring cyber strategies.« less

  8. Feared consequences of panic attacks in panic disorder: a qualitative and quantitative analysis.

    PubMed

    Raffa, Susan D; White, Kamila S; Barlow, David H

    2004-01-01

    Cognitions are hypothesized to play a central role in panic disorder (PD). Previous studies have used questionnaires to assess cognitive content, focusing on prototypical cognitions associated with PD; however, few studies have qualitatively examined cognitions associated with the feared consequences of panic attacks. The purpose of this study was to conduct a qualitative and quantitative analysis of feared consequences of panic attacks. The initial, qualitative analysis resulted in the development of 32 categories of feared consequences. The categories were derived from participant responses to a standardized, semi-structured question (n = 207). Five expert-derived categories were then utilized to quantitatively examine the relationship between cognitions and indicators of PD severity. Cognitions did not predict PD severity; however, correlational analyses indicated some predictive validity to the expert-derived categories. The qualitative analysis identified additional areas of patient-reported concern not included in previous research that may be important in the assessment and treatment of PD.

  9. BEDA FOMM: An Operational Analysis

    DTIC Science & Technology

    1994-06-03

    Germany’s. The Italians launched their attack into Greece from Albania on 28 October. Through a combination of bad weather and unexpected Greek resistance...attacked Italian airfields at Benina and Berka . 7 1 The infantry attacked at 0540 and were able to pass the tanks through before 0700. There was...escaped to the north into the Jebel Akhdar. Bad weather and bad road conditions contributed to 7th Armoured’s failure to pursue along with the

  10. Security of Electronic Voting in the United States

    DOE PAGES

    King, Charity; Thompson, Michael

    2016-10-20

    In the midst of numerous high-profile cyber-attacks, the US is considering whether to categorize the US electronic voting system as “critical infrastructure”, to be protected and invested in much the same way as the US power grid or waterways.

  11. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems.

    PubMed

    Zhang, Liping; Zhu, Shaohui

    2015-05-01

    To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.

  12. STAR Performance with SPEAR (Signal Processing Electronic Attack RFIC)

    DTIC Science & Technology

    2017-03-01

    STAR operation in the presence of 1 kW EIRP power , independently of the choice of transmitter in use. The paper reports on the status of the SPEAR...prototype will be presented. To the authors’ knowledge , the measured results from the prototype already demonstrate state-of-the-art STAR performance...self-generated high power interferers. SPEAR is an innovative approach to the full duplex challenge that meets the high demands of military systems

  13. Feasibility of Isolating Vulnerable Equipment of the Electric Power System from Sources of EMP

    DTIC Science & Technology

    1978-03-01

    Utilities, Colorado Springs, Colorado . Mr. Hugh Chastain, LaPlata Electric Association, Durango , Colcrado. Mr. Robert Kerger and Mr. James Ware...electric power systems, and (b) single-line diagrams for powar systems In the State of Colorado . 2. Determine the feanibility of manual isolation of...vulnerable equipment upon receipt ot’ attack warning. Feasibility should be studied in Colorado Syrings (risk area) and Fr-eemont County (host area) of

  14. Childhood internalizing and externalizing problems predict the onset of clinical panic attacks over adolescence: the TRAILS study.

    PubMed

    Mathyssek, Christina M; Olino, Thomas M; Verhulst, Frank C; van Oort, Floor V A

    2012-01-01

    Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. This study is part of the TRacking Adolescents' Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10-12). At age 18-20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10-20 years, using survival analysis in univariate and multivariate models. There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence.

  15. The diagnostic efficiency of the extended German Brøset Violence Checklist to assess the risk of violence.

    PubMed

    Rechenmacher, Josef; Müller, Gerhard; Abderhalden, Christoph; Schulc, Eva

    2014-01-01

    The prevention of aggression and violence of patients is part of the challenge for the psychiatric inpatient care. Resources needed are a systematic risk assessment and taking preventive measures according to the risk. The extended Brøset Violence Checklist (BVC-CH) is an assessment instrument for the short-term assessment of the risk of violence for physical attacks toward medical staff and other patients. Until now, the instrument was only validated in the context of the development phase of the instrument. The aim of this study was to investigate how valid the BVC-CH scale is for adult psychiatry in acute inpatient care facilities. In a prospective cohort study, 232 consecutively admitted patients were assessed using the BVC-CH. The calculation of the predictive values was based on a contingency table. The discriminatory power of the instrument and the determination of the cutoff point were done using the receiver operating characteristic (ROC) curve analysis. Physical attacks were registered with the Staff Observation of Aggression Scale-Revised (SOAS-R). The sensitivity was 58.8% and the specificity was 96.8% by a cutoff point of > or = 7. By choosing a cutoff point of > or = 6, the sensitivity was 64.7% and the specificity was 95.1%. A value of .93 was determined for the area under the curve receiver operating characteristic (AUC(ROC)). Overall, the BVC-CH is a valid instrument for the short-term prediction of physical attacks. Further research of the BVC-CH is recommended but in particular for the cutoff point.

  16. The robustness of multiplex networks under layer node-based attack

    PubMed Central

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-01-01

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology. PMID:27075870

  17. The robustness of multiplex networks under layer node-based attack.

    PubMed

    Zhao, Da-wei; Wang, Lian-hai; Zhi, Yong-feng; Zhang, Jun; Wang, Zhen

    2016-04-14

    From transportation networks to complex infrastructures, and to social and economic networks, a large variety of systems can be described in terms of multiplex networks formed by a set of nodes interacting through different network layers. Network robustness, as one of the most successful application areas of complex networks, has attracted great interest in a myriad of research realms. In this regard, how multiplex networks respond to potential attack is still an open issue. Here we study the robustness of multiplex networks under layer node-based random or targeted attack, which means that nodes just suffer attacks in a given layer yet no additional influence to their connections beyond this layer. A theoretical analysis framework is proposed to calculate the critical threshold and the size of giant component of multiplex networks when nodes are removed randomly or intentionally. Via numerous simulations, it is unveiled that the theoretical method can accurately predict the threshold and the size of giant component, irrespective of attack strategies. Moreover, we also compare the robustness of multiplex networks under multiplex node-based attack and layer node-based attack, and find that layer node-based attack makes multiplex networks more vulnerable, regardless of average degree and underlying topology.

  18. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.

    PubMed

    Wang, Chundong; Zhu, Likun; Gong, Liangyi; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-03-15

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

  19. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

    PubMed Central

    Wang, Chundong; Zhao, Zhentang; Yang, Lei; Liu, Zheli; Cheng, Xiaochun

    2018-01-01

    With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks. PMID:29543773

  20. The time of sunrise and the number of hours with daylight may influence the diurnal rhythm of acute heart attack mortality.

    PubMed

    Kriszbacher, Ildikó; Bódis, József; Boncz, Imre; Koppan, Agnes; Koppan, Miklós

    2010-04-01

    We investigated whether the time of sunrise and the number of daylight hours have an effect on the seasonality, or the daily rhythm of heart attack mortality. We analyzed retrospectively data of patients admitted to hospitals with the diagnosis of heart attack (n=32,329) and patients who deceased of a heart attack (n=5142) between January 1, 2004 and December 31, 2005 in Hungary. Heart attack mortality was highest during winter, while lowest number of events was recorded during summer . The daily peak of diurnality was between 6:00 am and 12:00 pm (33.77%). A positive correlation was found between the time of sunrise, time of sunset and the mortality caused by myocardial infarction (p<0,01). In the analysis of the number of daylight hours and the heart attack mortality we found a negative correlation (r=-0.105, p<0.05). No significant difference was found between sexes and different age-groups in heart attack mortality. Our data suggest, that the occurrence and the mortality of heart attack may be related to the time of sunrise and the number of daylight hours. Copyright 2008 Elsevier Ireland Ltd. All rights reserved.

  1. [Case of exploding head syndrome].

    PubMed

    Okura, Mutsumi; Taniguchi, Mitsutaka; Muraki, Hisae; Sugita, Hideko; Ohi, Motoharu

    2010-01-01

    Exploding head syndrome (EHS) attacks are characterized by the sensation of sudden loud banging noises, and are occasionally accompanied by the sensation of a flash light. Although these attacks in themselves are usually not painful, it is reported that EHS attacks may precede migraines and may be perceived as auras. A 53-year-old woman, with a 40-year history of fulgurating migraines, experienced 2 different types of EHS attacks. During most of the attacks, which were not painful, she heard sounds like someone yelling or cars passing by. Only 1 episode was accompanied with the sensation of a flash light and of sounds similar to those of an electrical short circuit. On the video-polysomnography, video-polysomnography showed 11 EHS attacks occurred during stage N1 and stage N2; these attacks were preceded by soft snoring. She also had moderate obstructive sleep apnea syndrome (Apnea Hypopnea Index: 16.7) for which an oral appliance was prescribed; the EHS attacks did not recur after this treatment. The pathophysiology of EHS is still unclear. A detailed analysis of PSG data may help in understanding the pathophysiology of this syndrome and also in the selection of therapeutic strategies.

  2. Flight test of the X-29A at high angle of attack: Flight dynamics and controls

    NASA Technical Reports Server (NTRS)

    Bauer, Jeffrey E.; Clarke, Robert; Burken, John J.

    1995-01-01

    The NASA Dryden Flight Research Center has flight tested two X-29A aircraft at low and high angles of attack. The high-angle-of-attack tests evaluate the feasibility of integrated X-29A technologies. More specific objectives focus on evaluating the high-angle-of-attack flying qualities, defining multiaxis controllability limits, and determining the maximum pitch-pointing capability. A pilot-selectable gain system allows examination of tradeoffs in airplane stability and maneuverability. Basic fighter maneuvers provide qualitative evaluation. Bank angle captures permit qualitative data analysis. This paper discusses the design goals and approach for high-angle-of-attack control laws and provides results from the envelope expansion and handling qualities testing at intermediate angles of attack. Comparisons of the flight test results to the predictions are made where appropriate. The pitch rate command structure of the longitudinal control system is shown to be a valid design for high-angle-of-attack control laws. Flight test results show that wing rock amplitude was overpredicted and aileron and rudder effectiveness were underpredicted. Flight tests show the X-29A airplane to be a good aircraft up to 40 deg angle of attack.

  3. A decision framework for managing risk to airports from terrorist attack.

    PubMed

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.

  4. Hybrid Intrusion Forecasting Framework for Early Warning System

    NASA Astrophysics Data System (ADS)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  5. Co-Simulation Platform For Characterizing Cyber Attacks in Cyber Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sadi, Mohammad A. H.; Ali, Mohammad Hassan; Dasgupta, Dipankar

    Smart grid is a complex cyber physical system containing a numerous and variety of sources, devices, controllers and loads. Communication/Information infrastructure is the backbone of the smart grid system where different grid components are connected with each other through this structure. Therefore, the drawbacks of the information technology related issues are also becoming a part of the smart grid. Further, smart grid is also vulnerable to the grid related disturbances. For such a dynamic system, disturbance and intrusion detection is a paramount issue. This paper presents a Simulink and OPNET based co-simulated test bed to carry out a cyber-intrusion inmore » a cyber-network for modern power systems and smart grid. The effect of the cyber intrusion on the physical power system is also presented. The IEEE 30 bus power system model is used to demonstrate the effectiveness of the simulated testbed. The experiments were performed by disturbing the circuit breakers reclosing time through a cyber-attack in the cyber network. Different disturbance situations in the proposed test system are considered and the results indicate the effectiveness of the proposed co-simulated scheme.« less

  6. ICS logging solution for network-based attacks using Gumistix technology

    NASA Astrophysics Data System (ADS)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  7. Graph Coarsening for Path Finding in Cybersecurity Graphs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh

    2013-01-01

    n the pass-the-hash attack, hackers repeatedly steal password hashes and move through a computer network with the goal of reaching a computer with high level administrative privileges. In this paper we apply graph coarsening in network graphs for the purpose of detecting hackers using this attack or assessing the risk level of the network's current state. We repeatedly take graph minors, which preserve the existence of paths in the graph, and take powers of the adjacency matrix to count the paths. This allows us to detect the existence of paths as well as find paths that have high risk ofmore » being used by adversaries.« less

  8. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T.

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, and analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: 1) to assess the potential terrorist threat to U.S. agricultural crops, 2) to determine whether suitable assays exist to monitor that threat, and 3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  9. Nucleic Acid-Based Detection and Identification of Bacterial and Fungal Plant Pathogens - Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingsley, Mark T

    2001-03-13

    The threat to American interests from terrorists is not limited to attacks against humans. Terrorists might seek to inflict damage to the U.S. economy by attacking our agricultural sector. Infection of commodity crops by bacterial or fungal crop pathogens could adversely impact U.S. agriculture, either directly from damage to crops or indirectly from damage to our ability to export crops suspected of contamination. Recognizing a terrorist attack against U.S. agriculture, to be able to prosecute the terrorists, is among the responsibilities of the members of Hazardous Material Response Unit (HMRU) of the Federal Bureau of Investigation (FBI). Nucleic acid analysismore » of plant pathogen strains by the use of polymerase chain reaction (PCR) amplification techniques is a powerful method for determining the exact identity of pathogens, as well as their possible region of origin. This type of analysis, however, requires that PCR assays be developed specific to each particular pathogen strain, an d analysis protocols developed that are specific to the particular instrument used for detection. The objectives of the work described here were threefold: (1) to assess the potential terrorist threat to U.S. agricultural crops, (2) to determine whether suitable assays exist to monitor that threat, and (3) where assays are needed for priority plant pathogen threats, to modify or develop those assays for use by specialists at the HMRU. The assessment of potential threat to U.S. commodity crops and the availability of assays for those threats were described in detail in the Technical Requirements Document (9) and will be summarized in this report. This report addresses development of specific assays identified in the Technical Requirements Document, and offers recommendations for future development to ensure that HMRU specialists will be prepared with the PCR assays they need to protect against the threat of economic terrorism.« less

  10. A Smart Sensor for Defending against Clock Glitching Attacks on the I2C Protocol in Robotic Applications

    PubMed Central

    Jiménez-Naharro, Raúl; Gómez-Bravo, Fernando; Medina-García, Jonathan; Sánchez-Raya, Manuel; Gómez-Galán, Juan Antonio

    2017-01-01

    This paper presents a study about hardware attacking and clock signal vulnerability. It considers a particular type of attack on the clock signal in the I2C protocol, and proposes the design of a new sensor for detecting and defending against this type of perturbation. The analysis of the attack and the defense is validated by means of a configurable experimental platform that emulates a differential drive robot. A set of experimental results confirm the interest of the studied vulnerabilities and the efficiency of the proposed sensor in defending against this type of situation. PMID:28346337

  11. Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks.

    PubMed

    Furrer, F; Franz, T; Berta, M; Leverrier, A; Scholz, V B; Tomamichel, M; Werner, R F

    2012-09-07

    We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of two-mode squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.

  12. Stall flutter analysis of propfans

    NASA Technical Reports Server (NTRS)

    Reddy, T. S. R.

    1988-01-01

    Three semi-empirical aerodynamic stall models are compared with respect to their lift and moment hysteresis loop prediction, limit cycle behavior, easy implementation, and feasibility in developing the parameters required for stall flutter prediction of advanced turbines. For the comparison of aeroelastic response prediction including stall, a typical section model and a plate structural model are considered. The response analysis includes both plunging and pitching motions of the blades. In model A, a correction of the angle of attack is applied when the angle of attack exceeds the static stall angle. In model B, a synthesis procedure is used for angles of attack above static stall angles, and the time history effects are accounted for through the Wagner function.

  13. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation.

    PubMed

    Wang, Z Jane; Wu, Min; Zhao, Hong Vicky; Trappe, Wade; Liu, K J Ray

    2005-06-01

    Digital fingerprinting is a method for protecting digital data in which fingerprints that are embedded in multimedia are capable of identifying unauthorized use of digital content. A powerful attack that can be employed to reduce this tracing capability is collusion, where several users combine their copies of the same content to attenuate/remove the original fingerprints. In this paper, we study the collusion resistance of a fingerprinting system employing Gaussian distributed fingerprints and orthogonal modulation. We introduce the maximum detector and the thresholding detector for colluder identification. We then analyze the collusion resistance of a system to the averaging collusion attack for the performance criteria represented by the probability of a false negative and the probability of a false positive. Lower and upper bounds for the maximum number of colluders K(max) are derived. We then show that the detectors are robust to different collusion attacks. We further study different sets of performance criteria, and our results indicate that attacks based on a few dozen independent copies can confound such a fingerprinting system. We also propose a likelihood-based approach to estimate the number of colluders. Finally, we demonstrate the performance for detecting colluders through experiments using real images.

  14. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    PubMed

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  15. Robust allocation of a defensive budget considering an attacker's private information.

    PubMed

    Nikoofal, Mohammad E; Zhuang, Jun

    2012-05-01

    Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.

  16. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks

    PubMed Central

    Chen, Xi; Zhu, Yuefei

    2017-01-01

    Network address shuffling is a novel moving target defense (MTD) that invalidates the address information collected by the attacker by dynamically changing or remapping the host’s network addresses. However, most network address shuffling methods are limited by the limited address space and rely on the host’s static domain name to map to its dynamic address; therefore these methods cannot effectively defend against random scanning attacks, and cannot defend against an attacker who knows the target’s domain name. In this paper, we propose a network defense method based on random domain name and address mutation (RDAM), which increases the scanning space of the attacker through a dynamic domain name method and reduces the probability that a host will be hit by an attacker scanning IP addresses using the domain name system (DNS) query list and the time window methods. Theoretical analysis and experimental results show that RDAM can defend against scanning attacks and worm propagation more effectively than general network address shuffling methods, while introducing an acceptable operational overhead. PMID:28489910

  17. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    PubMed

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  18. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    PubMed Central

    Xu, Guoai; Sun, Jing

    2017-01-01

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme. PMID:29257066

  19. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flach, G. P.

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  20. The Tank-Attack Helicopter in the European Mid-Intensity Conflict Environment: An Operational Effectiveness Analysis of Competitiveness/ Compatibility

    DTIC Science & Technology

    1975-06-06

    that the warp and woof of the whole cloth will not become discernible until the attack helicopter Is pitted against the tank In actual combat. The...This authoritative book on Soviet military thinking, a product of fifteen leading Soviet military theoreticians headed by Marshal Vasily ...the principal armor-defeating weapons systems ...Most people think in terms of two attack helicopters pitted against an enemy target, perhaps with

  1. "Kneecapping" Academic Freedom

    ERIC Educational Resources Information Center

    Kuehn, Robert R.; Joy, Peter A.

    2010-01-01

    This year, across the nation, state legislators and powerful corporate interests with financial ties to universities and influence over them have launched an unprecedented number of attacks on law school clinics. As universities increasingly seek to educate students through service-learning courses, law school clinics may be the bellwether for…

  2. True random bit generators based on current time series of contact glow discharge electrolysis

    NASA Astrophysics Data System (ADS)

    Rojas, Andrea Espinel; Allagui, Anis; Elwakil, Ahmed S.; Alawadhi, Hussain

    2018-05-01

    Random bit generators (RBGs) in today's digital information and communication systems employ a high rate physical entropy sources such as electronic, photonic, or thermal time series signals. However, the proper functioning of such physical systems is bound by specific constrains that make them in some cases weak and susceptible to external attacks. In this study, we show that the electrical current time series of contact glow discharge electrolysis, which is a dc voltage-powered micro-plasma in liquids, can be used for generating random bit sequences in a wide range of high dc voltages. The current signal is quantized into a binary stream by first using a simple moving average function which makes the distribution centered around zero, and then applying logical operations which enables the binarized data to pass all tests in industry-standard randomness test suite by the National Institute of Standard Technology. Furthermore, the robustness of this RBG against power supply attacks has been examined and verified.

  3. A novel approach to quantify cybersecurity for electric power systems

    NASA Astrophysics Data System (ADS)

    Kaster, Paul R., Jr.

    Electric Power grid cybersecurity is a topic gaining increased attention in academia, industry, and government circles, yet a method of quantifying and evaluating a system's security is not yet commonly accepted. In order to be useful, a quantification scheme must be able to accurately reflect the degree to which a system is secure, simply determine the level of security in a system using real-world values, model a wide variety of attacker capabilities, be useful for planning and evaluation, allow a system owner to publish information without compromising the security of the system, and compare relative levels of security between systems. Published attempts at quantifying cybersecurity fail at one or more of these criteria. This document proposes a new method of quantifying cybersecurity that meets those objectives. This dissertation evaluates the current state of cybersecurity research, discusses the criteria mentioned previously, proposes a new quantification scheme, presents an innovative method of modeling cyber attacks, demonstrates that the proposed quantification methodology meets the evaluation criteria, and proposes a line of research for future efforts.

  4. A Preliminary Analysis of the Flying Qualities of the Consolidated Vultee MX-813 Delta-Wing Airplane Configuration at Transonic and Low Supersonic Speeds as Determined from Flights of Rocket-Powered Models

    NASA Technical Reports Server (NTRS)

    Mitcham, Grady L.

    1949-01-01

    A preliminary analysis of the flying qualities of the Consolidated Vultee MX-813 delta-wing airplane configuration has been made based on the results obtained from the first two 1/8 scale models flown at the NACA Pilotless Aircraft Research Station, Wallop's Island, VA. The Mach number range covered in the tests was from 0.9 to 1.2. The analysis indicates adequate elevator control for trim in level flight over the speed range investigated. Through the transonic range there is a mild trim change with a slight tucking-under tendency. The elevator control effectiveness in the supersonic range is reduced to about one-half the subsonic value although sufficient control for maneuvering is available as indicated by the fact that 10 deg elevator deflection produced 5g acceleration at Mach number of 1.2 at 40,000 feet.The elevator control forces are high and indicate the power required of the boost system. The damping. of the short-period oscillation is adequate at sea-level but is reduced at 40,000 feet. The directional stability appears adequate for the speed range and angles of attack covered.

  5. AR.Drone: security threat analysis and exemplary attack to track persons

    NASA Astrophysics Data System (ADS)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  6. Unmanned Aerial Vehicles (UAVs): a new tool in counterterrorism operations?

    NASA Astrophysics Data System (ADS)

    Dörtbudak, Mehmet F.

    2015-05-01

    Terrorism is not a new phenomenon to the world, yet it remains difficult to define and counter. Countering terrorism requires several measures that must be taken simultaneously; however, counterterrorism strategies of many countries mostly depend on military measures. In the aftermath of the 2001 terrorist attack on the Twin Towers of the World Trade Center, the United States (U.S.) has started and led the campaign of Global War on Terrorism. They have invaded Afghanistan and Iraq and have encountered insurgencies run by terrorist organizations, such as al-Qaeda and its affiliates. The U.S. made the utilization of Air and Space Power very intensively during these operations. In order to implement operations; Intelligence, Surveillance, and Reconnaissance (ISR) assets were used to collect the necessary information. Before the successful insertion of a small number of U.S. Special Operation Force (SOF) teams into Afghanistan, the U.S. Air Force attacked al-Qaeda and Taliban's targets such as infrastructure, airfields, ground forces, command-control facilities etc. As soon as the U.S. troops got on the ground and started to marshal to Kabul, the Air Force supported them by attacking jointly determined targets. The Air Force continued to carry out the missions and played a significant role to achieve the objective of operation during all the time. This is not the only example of utilization of Air and Space Power in counterterrorism and counterinsurgency operations. All around the world, many countries have also made the utilization of Air Power in different missions ranging from ISR to attacking. Thinking that terrorism has a psychological dimension and losing a pilot during operations may result in decreasing the population support to operations, Unmanned Aerial Vehicles (UAVs) started to be used by practitioners and took priority over other assets. Although UAVs have been on the theatre for a long time used for ISR mission in conventional conflicts, with the advent of drones, UAVs have also started to be used for attack missions in counterterrorism operations. In this study, it is aimed to determine whether UAVs are appropriate assets that can be used in counterterrorism operations. The study starts by examining the term terrorism and counterterrorism and discusses the role of the Air and Space Power in counterterrorism operations. After proposing that UAVs are appropriate assets for counterterrorism operations, it continues by explaining types and common usage concepts of UAVs. The advantages and disadvantages of UAVs are put forward from the counterterrorism operations' perspectives. It finally examines the utilization of UAVs in counterterrorism operations. In this context, as much as obtained from open sources, countries' roadmaps, usage concepts, experience, and current structure are examined to determine whether UAVs are appropriate assets in counterterrorism operations. When the advantages of UAVs and the disadvantages of manned systems are analyzed, other findings of our survey will show us that UAVs will be increasingly used in counterterrorism operations

  7. GRIZZLY Model of Multi-Reactive Species Diffusion, Moisture/Heat Transfer and Alkali-Silica Reaction for Simulating Concrete Aging and Degradation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Huang, Hai; Spencer, Benjamin W.; Cai, Guowei

    Concrete is widely used in the construction of nuclear facilities because of its structural strength and its ability to shield radiation. The use of concrete in nuclear power plants for containment and shielding of radiation and radioactive materials has made its performance crucial for the safe operation of the facility. As such, when life extension is considered for nuclear power plants, it is critical to have accurate and reliable predictive tools to address concerns related to various aging processes of concrete structures and the capacity of structures subjected to age-related degradation. The goal of this report is to document themore » progress of the development and implementation of a fully coupled thermo-hydro-mechanical-chemical model in GRIZZLY code with the ultimate goal to reliably simulate and predict long-term performance and response of aged NPP concrete structures subjected to a number of aging mechanisms including external chemical attacks and volume-changing chemical reactions within concrete structures induced by alkali-silica reactions and long-term exposure to irradiation. Based on a number of survey reports of concrete aging mechanisms relevant to nuclear power plants and recommendations from researchers in concrete community, we’ve implemented three modules during FY15 in GRIZZLY code, (1) multi-species reactive diffusion model within cement materials; (2) coupled moisture and heat transfer model in concrete; and (3) anisotropic, stress-dependent, alkali-silica reaction induced swelling model. The multi-species reactive diffusion model was implemented with the objective to model aging of concrete structures subjected to aggressive external chemical attacks (e.g., chloride attack, sulfate attack, etc.). It considers multiple processes relevant to external chemical attacks such as diffusion of ions in aqueous phase within pore spaces, equilibrium chemical speciation reactions and kinetic mineral dissolution/precipitation. The moisture/heat transfer module was implemented to simulate long-term spatial and temporal evolutions of the moisture and temperature fields within concrete structures at both room and elevated temperatures. The ASR swelling model implemented in GRIZZLY code can simulate anisotropic expansions of ASR gel under either uniaxial, biaxial and triaxial stress states, and can be run simultaneously with the moisture/heat transfer model and coupled with various elastic/inelastic solid mechanics models that were implemented in GRIZZLY code previously. This report provides detailed descriptions of the governing equations, constitutive equations and numerical algorithms of the three modules implemented in GRIZZLY during FY15, simulation results of example problems and model validation results by comparing simulations with available experimental data reported in the literature. The close match between the experiments and simulations clearly demonstrate the potential of GRIZZLY code for reliable evaluation and prediction of long-term performance and response of aged concrete structures in nuclear power plants.« less

  8. Preventing Terrorism Using Information Sharing Networks

    DTIC Science & Technology

    2006-09-01

    in fusing information and providing valuable intelligence that thwarted a terrorist attack at Disneyland . A videotape was received that contained a...creditable threat of a Sarin gas attack at Disneyland . The LA TEW conducted the initial analysis of the tape and the initial investigation that

  9. Physical Fitness as It Pertains to Sustained Military Operations

    DTIC Science & Technology

    1986-05-01

    Vogel and his colleagues (Vogel et al., 1983, Murphy et al., 1985) measured initial V02 max, and 2-mile run time, anaerobic power of the arms and...trial, and troop performance was evaluated by observers. Vogel and his co-workers found arm strength and arm anaerobic p,4er to decrease following...defense from infantry ground attack. Measurements of isometric, handgrip strength and upper and lower body anaerobic power (using the Wingate test) were

  10. Professional Irregular Defense Forces: The Other Side of COIN

    DTIC Science & Technology

    2012-06-01

    and Small Powers, 26. 70 Wight, Power Politics, 160. 24 attacked.71 During the Second World War, Nazi Germany, based on its temporary interests...Rise and Fall of the Third Reich: A History of Nazi Germany (New York: Simon and Schuster, 1990), 721–723. 73 Karsh, Neutrality and Small States, 26...93 VI. THE YUGOSLAV PARTISANS A. BACKGROUND On 1 September 1939, Nazi Germany invaded Poland and the Second World War began. Following a quick

  11. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Gisin, Nicolas; Scarani, Valerio

    2004-01-01

    We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantly increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.

  12. Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System.

    PubMed

    Liu, Yang; Li, Sihai; Fu, Qiangwen; Liu, Zhenbo

    2018-05-04

    In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing attacks. A better understanding of the integrated navigation system’s behavior with spoofed GNSS measurements gives us valuable clues to develop effective spoofing defenses. This paper focuses on an impact assessment of GNSS spoofing attacks on the integrated navigation system Kalman filter’s error covariance, innovation sequence and inertial sensor bias estimation. A simple and straightforward measurement-level trajectory spoofing simulation framework is presented, serving as the basis for an impact assessment of both unsynchronized and synchronized spoofing attacks. Recommendations are given for spoofing detection and mitigation based on our findings in the impact assessment process.

  13. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  14. Analysis of Multi-Antenna GNSS Receiver Performance under Jamming Attacks.

    PubMed

    Vagle, Niranjana; Broumandan, Ali; Lachapelle, Gérard

    2016-11-17

    Although antenna array-based Global Navigation Satellite System (GNSS) receivers can be used to mitigate both narrowband and wideband electronic interference sources, measurement distortions induced by array processing methods are not suitable for high precision applications. The measurement distortions have an adverse effect on the carrier phase ambiguity resolution, affecting the navigation solution. Depending on the array attitude information availability and calibration parameters, different spatial processing methods can be implemented although they distort carrier phase measurements in some cases. This paper provides a detailed investigation of the effect of different array processing techniques on array-based GNSS receiver measurements and navigation performance. The main novelty of the paper is to provide a thorough analysis of array-based GNSS receivers employing different beamforming techniques from tracking to navigation solution. Two beamforming techniques, namely Power Minimization (PM) and Minimum Power Distortionless Response (MPDR), are being investigated. In the tracking domain, the carrier Doppler, Phase Lock Indicator (PLI), and Carrier-to-Noise Ratio (C/N₀) are analyzed. Pseudorange and carrier phase measurement distortions and carrier phase position performance are also evaluated. Performance analyses results from simulated GNSS signals and field tests are provided.

  15. Death by Murder: A Study of Women Murderers.

    ERIC Educational Resources Information Center

    Biggers, Trisha A.

    1979-01-01

    The average female murderer is 35 or older, poorly educated, has few job skills, and, in prison, is generally placid, withdrawn, and nonassertive. The female murderers interviewed attacked their victims during domestic quarrels in an attempt to resolve a conflict, assert power, or protect themselves. (Author)

  16. Speed limits of aircraft

    NASA Technical Reports Server (NTRS)

    Everling, E

    1923-01-01

    This paper is restricted to the question of attainable speed limits and attacks the problem from different angles. Theoretical limits due to air resistance are presented along with design factors which may affect speed such as wing loads, wing areas, wing section shifting, landing speeds, drag-lift ratios, and power coefficients.

  17. Stuxnet, Schmitt Analysis, and the Cyber Use-of-Force Debate

    DTIC Science & Technology

    2012-01-01

    demonstration during exercise Bold Alligator 2012 U . S . N av y (J os hu a J. W ah l) 46 JFQ / issue 67, 4 th quarter 2012 ndupress .ndu.edu...language; and Article 51’ s “armed attack ” threshold for self-defense actions. 18 Schmitt, “Computer Network Attack and the Use of Force,” 920. 19...sponsored cyber coercion. More importantly, the prospect of cyber attacks causing physical damage was largely theoretical.4 Beginning Stuxnet, Schmitt

  18. An Analysis of Factors That Influence Logistics, Operational Availability, and Flight Hour Supply of the German Attack Helicopter Fleet

    DTIC Science & Technology

    2017-06-01

    maintenance times from the fleet are randomly resampled when running the model to enhance model realism. The use of a simulation model to represent the...helicopter regiment. 2. Attack Helicopter UH TIGER The EC665, or Airbus Helicopter TIGER, (Figure 3) is a four- bladed , twin- engine multi-role attack...migrated into the automated management system SAP Standard Product Family (SASPF), and the usage clock starts to run with the amount of the current

  19. Dimensional structure of bodily panic attack symptoms and their specific connections to panic cognitions, anxiety sensitivity and claustrophobic fears.

    PubMed

    Drenckhan, I; Glöckner-Rist, A; Rist, F; Richter, J; Gloster, A T; Fehm, L; Lang, T; Alpers, G W; Hamm, A O; Fydrich, T; Kircher, T; Arolt, V; Deckert, J; Ströhle, A; Wittchen, H-U; Gerlach, A L

    2015-06-01

    Previous studies of the dimensional structure of panic attack symptoms have mostly identified a respiratory and a vestibular/mixed somatic dimension. Evidence for additional dimensions such as a cardiac dimension and the allocation of several of the panic attack symptom criteria is less consistent. Clarifying the dimensional structure of the panic attack symptoms should help to specify the relationship of potential risk factors like anxiety sensitivity and fear of suffocation to the experience of panic attacks and the development of panic disorder. In an outpatient multicentre study 350 panic patients with agoraphobia rated the intensity of each of the ten DSM-IV bodily symptoms during a typical panic attack. The factor structure of these data was investigated with nonlinear confirmatory factor analysis (CFA). The identified bodily symptom dimensions were related to panic cognitions, anxiety sensitivity and fear of suffocation by means of nonlinear structural equation modelling (SEM). CFA indicated a respiratory, a vestibular/mixed somatic and a cardiac dimension of the bodily symptom criteria. These three factors were differentially associated with specific panic cognitions, different anxiety sensitivity facets and suffocation fear. Taking into account the dimensional structure of panic attack symptoms may help to increase the specificity of the associations between the experience of panic attack symptoms and various panic related constructs.

  20. Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    NASA Astrophysics Data System (ADS)

    Montminy, David P.

    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information.

  1. Negative Campaigning and the Logic of Retaliation in Multiparty Competition.

    PubMed

    Dolezal, Martin; Ennser-Jedenastik, Laurenz; Müller, Wolfgang C

    2016-04-01

    The extant literature has demonstrated that the logic of retaliation is a core feature of negative campaigning. Attacks by one side induce counterattacks by the other. Yet most research on the interactive nature of negative campaigning is limited to two-party competition and provides little theoretical justification for why political actors should respond to attacks with counterattacks. The present paper addresses these research gaps. We argue that the negativity bias in human information processing and the zero-sum nature of elections make retaliation a rational strategy. Importantly, these arguments also imply that retaliation may not be the only plausible response to attacks in multiparty systems. Rather, parties may prefer to react to attacks from one competitor by attacking another. To grasp empirically how being attacked and attacking are related, we conduct a highly disaggregated time series analysis of such instances while controlling for other factors that may influence actor behavior. Our analyses draw on several thousand party press releases issued during three national election campaigns in Austria, a typical European multiparty system. They show that retaliation is an important strategy also in multiparty politics. Yet in such context, parties do not exclusively follow a tit-for-tat approach but rather display more complex patterns of attack behavior.

  2. Negative Campaigning and the Logic of Retaliation in Multiparty Competition

    PubMed Central

    Dolezal, Martin; Ennser-Jedenastik, Laurenz; Müller, Wolfgang C.

    2016-01-01

    The extant literature has demonstrated that the logic of retaliation is a core feature of negative campaigning. Attacks by one side induce counterattacks by the other. Yet most research on the interactive nature of negative campaigning is limited to two-party competition and provides little theoretical justification for why political actors should respond to attacks with counterattacks. The present paper addresses these research gaps. We argue that the negativity bias in human information processing and the zero-sum nature of elections make retaliation a rational strategy. Importantly, these arguments also imply that retaliation may not be the only plausible response to attacks in multiparty systems. Rather, parties may prefer to react to attacks from one competitor by attacking another. To grasp empirically how being attacked and attacking are related, we conduct a highly disaggregated time series analysis of such instances while controlling for other factors that may influence actor behavior. Our analyses draw on several thousand party press releases issued during three national election campaigns in Austria, a typical European multiparty system. They show that retaliation is an important strategy also in multiparty politics. Yet in such context, parties do not exclusively follow a tit-for-tat approach but rather display more complex patterns of attack behavior. PMID:27904657

  3. ATTACKS ON LINKING OR A DRIVE TO COMMUNICATE? TOLERATING THE PARADOX.

    PubMed

    Bergstein, Avner

    2015-10-01

    The notion of attacks on linking, as described by Bion, may depict a patient's drive to communicate the internalization of a destructive relationship between a primary object and an infant. This may be enacted between patient and analyst in the here and now of the analysis, whereby fragmentation and numbing of thinking may point to a primitive catastrophe relived in the psychoanalytic setting. The patient's material may seem incoherent, but incoherence might be the communication the patient is unconsciously trying to convey. Thus, the notion of attacks on linking depicts a paradoxical, caesural experience in which the attack on linking is itself a link. © 2015 The Psychoanalytic Quarterly, Inc.

  4. Boundary-layer measurements on a transonic low-aspect ratio wing

    NASA Technical Reports Server (NTRS)

    Keener, Earl R.

    1985-01-01

    Tabulations and plots are presented of boundary-layer velocity and flow-direction surveys from wind-tunnel tests of a large-scale (0.90 m semi-span) model of the NASA/Lockheed Wing C. This wing is a generic, transonic, supercritical, highly three-dimensional, low-aspect-ratio configuration designed with the use of a three-dimensional, transonic full-potential-flow wing code (FLO22). Tests were conducted at the design angle of attack of 5 deg over a Mach number range from 0.25 to 0.96 and a Reynolds number range of 3.4x10 to the 6th power. Wing pressures were measured at five span stations, and boundary-layer surveys were measured at the midspan station. The data are presented without analysis.

  5. Cascading failure in scale-free networks with tunable clustering

    NASA Astrophysics Data System (ADS)

    Zhang, Xue-Jun; Gu, Bo; Guan, Xiang-Min; Zhu, Yan-Bo; Lv, Ren-Li

    2016-02-01

    Cascading failure is ubiquitous in many networked infrastructure systems, such as power grids, Internet and air transportation systems. In this paper, we extend the cascading failure model to a scale-free network with tunable clustering and focus on the effect of clustering coefficient on system robustness. It is found that the network robustness undergoes a nonmonotonic transition with the increment of clustering coefficient: both highly and lowly clustered networks are fragile under the intentional attack, and the network with moderate clustering coefficient can better resist the spread of cascading. We then provide an extensive explanation for this constructive phenomenon via the microscopic point of view and quantitative analysis. Our work can be useful to the design and optimization of infrastructure systems.

  6. Fast Fragmentation of Networks Using Module-Based Attacks

    PubMed Central

    Requião da Cunha, Bruno; González-Avella, Juan Carlos; Gonçalves, Sebastián

    2015-01-01

    In the multidisciplinary field of Network Science, optimization of procedures for efficiently breaking complex networks is attracting much attention from a practical point of view. In this contribution, we present a module-based method to efficiently fragment complex networks. The procedure firstly identifies topological communities through which the network can be represented using a well established heuristic algorithm of community finding. Then only the nodes that participate of inter-community links are removed in descending order of their betweenness centrality. We illustrate the method by applying it to a variety of examples in the social, infrastructure, and biological fields. It is shown that the module-based approach always outperforms targeted attacks to vertices based on node degree or betweenness centrality rankings, with gains in efficiency strongly related to the modularity of the network. Remarkably, in the US power grid case, by deleting 3% of the nodes, the proposed method breaks the original network in fragments which are twenty times smaller in size than the fragments left by betweenness-based attack. PMID:26569610

  7. Robust-yet-fragile nature of interdependent networks

    NASA Astrophysics Data System (ADS)

    Tan, Fei; Xia, Yongxiang; Wei, Zhi

    2015-05-01

    Interdependent networks have been shown to be extremely vulnerable based on the percolation model. Parshani et al. [Europhys. Lett. 92, 68002 (2010), 10.1209/0295-5075/92/68002] further indicated that the more intersimilar networks are, the more robust they are to random failures. When traffic load is considered, how do the coupling patterns impact cascading failures in interdependent networks? This question has been largely unexplored until now. In this paper, we address this question by investigating the robustness of interdependent Erdös-Rényi random graphs and Barabási-Albert scale-free networks under either random failures or intentional attacks. It is found that interdependent Erdös-Rényi random graphs are robust yet fragile under either random failures or intentional attacks. Interdependent Barabási-Albert scale-free networks, however, are only robust yet fragile under random failures but fragile under intentional attacks. We further analyze the interdependent communication network and power grid and achieve similar results. These results advance our understanding of how interdependency shapes network robustness.

  8. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

    PubMed Central

    Park, Namje; Kang, Namhi

    2015-01-01

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759

  9. The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks

    NASA Astrophysics Data System (ADS)

    Ristenpart, Thomas; Yilek, Scott

    Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.

  10. The Potential Impact of an Anthrax Attack on Real Estate Prices and Foreclosures in Seattle.

    PubMed

    Dormady, Noah; Szelazek, Thomas; Rose, Adam

    2014-01-01

    This article provides a methodology for the economic analysis of the potential consequences of a simulated anthrax terrorism attack on real estate within the Seattle metropolitan area. We estimate spatially disaggregated impacts on median sales price of residential housing within the Seattle metro area following an attack on the central business district (CBD). Using a combination of longitudinal panel regression and GIS analysis, we find that the median sales price in the CBD could decline by as much as $280,000, and by nearly $100,000 in nearby communities. These results indicate that total residential property values could decrease by over $50 billion for Seattle, or a 33% overall decline. We combine these estimates with HUD's 2009 American Housing Survey (AHS) to further predict 70,000 foreclosures in Seattle spatial zones following the terrorism event. © 2013 Society for Risk Analysis.

  11. Tactical missile aerodynamics

    NASA Technical Reports Server (NTRS)

    Hemsch, Michael J. (Editor); Nielsen, Jack N. (Editor)

    1986-01-01

    The present conference on tactical missile aerodynamics discusses autopilot-related aerodynamic design considerations, flow visualization methods' role in the study of high angle-of-attack aerodynamics, low aspect ratio wing behavior at high angle-of-attack, supersonic airbreathing propulsion system inlet design, missile bodies with noncircular cross section and bank-to-turn maneuvering capabilities, 'waverider' supersonic cruise missile concepts and design methods, asymmetric vortex sheding phenomena from bodies-of-revolution, and swept shock wave/boundary layer interaction phenomena. Also discussed are the assessment of aerodynamic drag in tactical missiles, the analysis of supersonic missile aerodynamic heating, the 'equivalent angle-of-attack' concept for engineering analysis, the vortex cloud model for body vortex shedding and tracking, paneling methods with vorticity effects and corrections for nonlinear compressibility, the application of supersonic full potential method to missile bodies, Euler space marching methods for missiles, three-dimensional missile boundary layers, and an analysis of exhaust plumes and their interaction with missile airframes.

  12. Poor sleep linked to increased risk of heart attack and stroke.

    PubMed

    2017-04-19

    Insomnia is associated with an increased risk of heart attack and stroke, according to a study in China. Researchers carried out a meta-analysis of 15 cohort studies to assess the association between insomnia symptoms and incidence or death from cardiovascular disease and stroke.

  13. Childhood Internalizing and Externalizing Problems Predict the Onset of Clinical Panic Attacks over Adolescence: The TRAILS Study

    PubMed Central

    Mathyssek, Christina M.; Olino, Thomas M.; Verhulst, Frank C.; van Oort, Floor V. A.

    2012-01-01

    Background Panic attacks are a source of individual suffering and are an independent risk factor for later psychopathology. However, much less is known about risk factors for the development of panic attacks, particularly during adolescence when the incidence of panic attacks increases dramatically. We examined whether internalizing and externalizing problems in childhood predict the onset of panic attacks in adolescence. Method This study is part of the TRacking Adolescents’ Individual Lives Survey (TRAILS), a Dutch longitudinal population cohort study (N = 1,584). Internalizing and Externalizing Problems were collected using the Youth Self-Report (YSR) and the parent-report Child Behavior Checklist (CBCL) at baseline (age 10–12). At age 18–20, DSM-IV defined panic attacks since baseline were assessed with the Composite International Diagnostic Interview (CIDI). We investigated whether early adolescent Internalizing and Externalizing Problems predicted panic attacks between ages 10–20 years, using survival analysis in univariate and multivariate models. Results There were N = 314 (19.8%) cases who experienced at least one DSM-IV defined panic attack during adolescence and N = 18 (1.2%) who developed panic disorder during adolescence. In univariate analyses, CBCL Total Problems, Internalizing Problems and three of the eight syndrome scales predicted panic attack onset, while on the YSR all broad-band problem scales and each narrow-band syndrome scale predicted panic attack onset. In multivariate analyses, CBCL Social Problems (HR 1.19, p<.05), and YSR Thought Problems (HR 1.15, p<.05) and Social Problems (HR 1.26, p<.01) predicted panic attack onset. Conclusion Risk indicators of panic attack include the wide range of internalizing and externalizing problems. Yet, when adjusted for co-occurring problem behaviors, Social Problems were the most consistent risk factor for panic attack onsets in adolescence. PMID:23251576

  14. On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

    NASA Astrophysics Data System (ADS)

    Herbauts, I. M.; Bettelli, S.; Hã¼bel, H.; Peev, M.

    2008-02-01

    Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related unfortunate news feature by a scientific journal [G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007); Nature 447, 372 (2007)] has spurred some concern in the QKD community and among the general public by misinterpreting the implications of this work. The present article proves the existence of a stronger individual attack on QKD protocols with encrypted error correction, for which tight bounds are shown, and clarifies why the claims of the news feature incorrectly suggest a contradiction with the established “old-style” theory of BB84 individual attacks. The full implementation of a quantum cryptographic protocol includes a reconciliation and a privacy-amplification stage, whose choice alters in general both the maximum extractable secret and the optimal eavesdropping attack. The authors of [Phys. Rev. A 75, 042327 (2007)] are concerned only with the error-free part of the so-called sifted string, and do not consider faulty bits, which, in the version of their protocol, are discarded. When using the provably superior reconciliation approach of encrypted error correction (instead of error discard), the Slutsky-Brandt attack is no more optimal and does not “threaten” the security bound derived by Lütkenhaus [Phys. Rev. A 59, 3301 (1999)]. It is shown that the method of Slutsky and collaborators [Phys. Rev. A 57, 2383 (1998)] can be adapted to reconciliation with error correction, and that the optimal entangling probe can be explicitly found. Moreover, this attack fills Lütkenhaus bound, proving that it is tight (a fact which was not previously known).

  15. Attacks on quantum key distribution protocols that employ non-ITS authentication

    NASA Astrophysics Data System (ADS)

    Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.

    2016-01-01

    We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

  16. Low-speed wind tunnel performance of high-speed counterrotation propellers at angle-of-attack

    NASA Technical Reports Server (NTRS)

    Hughes, Christopher E.; Gazzaniga, John A.

    1989-01-01

    The low-speed aerodynamic performance characteristics of two advanced counterrotation pusher-propeller configurations with cruise design Mach numbers of 0.72 were investigated in the NASA Lewis 9- by 15-Foot Low-Speed Wind Tunnel. The tests were conducted at Mach number 0.20, which is representative of the aircraft take-off/landing flight regime. The investigation determined the effect of nonuniform inflow on the propeller performance characteristics for several blade angle settings and a range of rotational speeds. The inflow was varied by yawing the propeller model to angle-of-attack by as much as plus or minus 16 degrees and by installing on the counterrotation propeller test rig near the propeller rotors a model simulator of an aircraft engine support pylon and fuselage. The results of the investigation indicated that the low-speed performance of the counterrotation propeller configurations near the take-off target operating points were reasonable and were fairly insensitive to changes in model angle-of-attack without the aircraft pylon/fuselage simulators installed on the propeller test rig. When the aircraft pylon/fuselage simulators were installed, small changes in propeller performance were seen at zero angle-of-attack, but fairly large changes in total power coefficient and very large changes of aft-to-forward-rotor torque ratio were produced when the propeller model was taken to angle-of-attack. The propeller net efficiency, though, was fairly insensitive to any changes in the propeller flowfield conditions near the take-off target operating points.

  17. Prediction of first episode of panic attack among white-collar workers.

    PubMed

    Watanabe, Akira; Nakao, Kazuhisa; Tokuyama, Madoka; Takeda, Masatoshi

    2005-04-01

    The purpose of the present study was to elucidate a longitudinal matrix of the etiology for first-episode panic attack among white-collar workers. A path model was designed for this purpose. A 5-year, open-cohort study was carried out in a Japanese company. To evaluate the risk factors associated with the onset of a first episode of panic attack, the odds ratios of a new episode of panic attack were calculated by logistic regression. The path model contained five predictor variables: gender difference, overprotection, neuroticism, lifetime history of major depression, and recent stressful life events. The logistic regression analysis indicated that a person with a lifetime history of major depression and recent stressful life events had a fivefold and a threefold higher risk of panic attacks at follow up, respectively. The path model for the prediction of a first episode of panic attack fitted the data well. However, this model presented low accountability for the variance in the ultimate dependent variables, the first episode of panic attack. Three predictors (neuroticism, lifetime history of major depression, and recent stressful life events) had a direct effect on the risk for a first episode of panic attack, whereas gender difference and overprotection had no direct effect. The present model could not fully predict first episodes of panic attack in white-collar workers. To make a path model for the prediction of the first episode of panic attack, other strong predictor variables, which were not surveyed in the present study, are needed. It is suggested that genetic variables are among the other strong predictor variables. A new path model containing genetic variables (e.g. family history etc.) will be needed to predict the first episode of panic attack.

  18. Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.

    PubMed

    Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M

    2013-04-01

    The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.

  19. Effects of tonabersat on migraine with aura: a randomised, double-blind, placebo-controlled crossover study.

    PubMed

    Hauge, Anne W; Asghar, Mohammed S; Schytz, Henrik W; Christensen, Karl; Olesen, Jes

    2009-08-01

    Migraine with aura is thought likely to be caused by cortical spreading depression (CSD). Tonabersat inhibits CSD, and we therefore investigated whether tonabersat has a preventive effect in migraine with aura. In this randomised, double-blind, placebo-controlled crossover trial, 40 mg tonabersat once daily was compared with matched placebo in patients who had at least one aura attack per month during the past 3 months. Randomisation was by computer-generated list. Patients kept a detailed diary to enable objective diagnosis of each attack as migraine with aura, migraine without aura, or other type of headache. Primary endpoints were a reduction in aura attacks with or without headache and a reduction in migraine headache days with or without an aura. Analysis was per protocol. This trial is registered, number NCT00332007. 39 patients were included in the study, of whom 31 were included in the statistical analysis of efficacy. Median (IQR) attacks of aura were reduced from 3.2 (1.0-5.0) per 12 weeks on placebo to 1.0 (0-3.0) on tonabersat (p=0.01), whereas the other primary outcome measure, median migraine headache days with or without aura, was not significantly different between placebo and tonabersat groups (3.0 days in each group; p=0.09). Tonabersat was well tolerated but overall had more side-effects than placebo. Tonabersat showed a preventive effect on attacks of migraine aura but no efficacy on non-aura attacks, in keeping with its known inhibitory effect on CSD. The results support the theory that auras are caused by CSD and that this phenomenon is not involved in attacks without aura. Minster Pharmaceuticals; Lundbeck Foundation.

  20. Complexing agents and pH influence on chemical durability of type I moulded glass containers.

    PubMed

    Biavati, Alberto; Poncini, Michele; Ferrarini, Arianna; Favaro, Nicola; Scarpa, Martina; Vallotto, Marta

    2017-06-16

    Among the factors that affect the glass surface chemical durability, pH and complexing agents presence in aqueous solution have the main role (1). Glass surface attack can be also related to the delamination issue with glass particles appearance in the pharmaceutical preparation. A few methods to check for glass containers delamination propensity and some control guidelines have been proposed (2,3). The present study emphasizes the possible synergy between a few complexing agents with pH on the borosilicate glass chemical durability. Hydrolytic attack was performed in small volume 23 ml type I glass containers autoclaved according to EP or USP for 1 hour at 121°C, in order to enhance the chemical attack due to time, temperature and the unfavourable surface/volume ratio. 0,048 M or 0.024 M (moles/liter) solutions of the acids citric, glutaric, acetic, EDTA (ethylenediaminetetraacetic acid) and sodium phosphate with water for comparison, were used for the trials. The pH was adjusted ± 0,05 units at fixed values 5,5-6,6-7-7,4-8-9 by LiOH diluted solution. Since silicon is the main glass network former, silicon release into the attack solutions was chosen as the main index of the glass surface attack and analysed by ICPAES. The work was completed by the analysis of the silicon release in the worst attack conditions, of moulded glass, soda lime type II and tubing borosilicate glass vials to compare different glass compositions and forming technologies. Surface analysis by SEM was finally performed to check for the surface status after the worst chemical attack condition by citric acid. Copyright © 2017, Parenteral Drug Association.

  1. Superstorm Sandy: Implications For Designing A PostCyber Attack Power Restoration System

    DTIC Science & Technology

    2016-03-31

    for such progress. Phillip Allison, “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems: Building Security into Your Industrial...TechSvcs/Multi-stateFleetResponseWorkshopReport-02-21-13.pdf. Allison, Phillip. “ Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

  2. A 5TH GENERATION FIGHTER FOR BELGIUM:LUXURY OR NECESSITY

    DTIC Science & Technology

    2016-02-16

    violence to assert power. Overall, 3 we see threats, old and new, from piracy to terrorism to cyber-attacks. Based on these increased threats, NATO...share information seamlessly and contribute to a Common Operating Picture ( COP ). This construct will balance speed with accuracy to deliver the

  3. To amend the Federal Power Act to provide additional authorities to adequately protect the critical electric infrastructure against cyber attack, and for other purposes.

    THOMAS, 111th Congress

    Rep. Thompson, Bennie G. [D-MS-2

    2009-04-30

    House - 05/26/2009 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Perspectives on Privacy and Terrorism: All Is not Lost--Yet.

    ERIC Educational Resources Information Center

    Gellman, Robert

    2002-01-01

    Discusses implications of the U.S.A. Patriot Act, antiterrorism legislation that was passed after the September 11 attacks, regarding privacy issues. Highlights include information privacy; privacy and government, including increases in the surveillance powers of government; privacy and the private sector; and future possibilities. (Author/LRW)

  5. On the Treatment of Authors, Outliers, and Purchasing Power Parity Exchange Rates.

    ERIC Educational Resources Information Center

    Jaeger, Richard M.

    1993-01-01

    Ruth Stott violates canons of scholarly debate by attacking author's October 1992 "Kappan" article on world-class academic standards. Average class size predicted only 10% of variation in 13 year-olds' mean mathematics scores in 14 nations supplying reasonable comprehensive sampling frames for International Assessment of Academic…

  6. Executive Power in an Age of Terror

    ERIC Educational Resources Information Center

    Landman, James H.

    2006-01-01

    One week after the terrorist attacks of September 11, 2001, the Congress passed an Authorization for the Use of Military Force (The Authorization) that authorized the president--"... to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist…

  7. An Intelligent Fingerprint-Biometric Image Scrambling Scheme

    NASA Astrophysics Data System (ADS)

    Khan, Muhammad Khurram; Zhang, Jiashu

    To obstruct the attacks, and to hamper with the liveness and retransmission issues of biometrics images, we have researched on the challenge/response-based biometrics scrambled image transmission. We proposed an intelligent biometrics sensor, which has computational power to receive challenges from the authentication server and generate response against the challenge with the encrypted biometric image. We utilized the FRT for biometric image encryption and used its scaling factors and random phase mask as the additional secret keys. In addition, we chaotically generated the random phase masks by a chaotic map to further improve the encryption security. Experimental and simulation results have shown that the presented system is secure, robust, and deters the risks of attacks of biometrics image transmission.

  8. HIDEC adaptive engine control system flight evaluation results

    NASA Technical Reports Server (NTRS)

    Yonke, W. A.; Landy, R. J.; Stewart, J. F.

    1987-01-01

    An integrated flight propulsion control mode, the Adaptive Engine Control System (ADECS), has been developed and flight tested on an F-15 aircraft as part of the NASA Highly Integrated Digital Electronic Control program. The ADECS system realizes additional engine thrust by increasing the engine pressure ratio (EPR) at intermediate and afterburning power, with the amount of EPR uptrim modulated using a predictor scheme for angle-of-attack and sideslip angle. Substantial improvement in aircraft and engine performance was demonstrated, with a 16 percent rate of climb increase, a 14 percent reduction in time to climb, and a 15 percent reduction in time to accelerate. Significant EPR uptrim capability was found with angles-of-attack up to 20 degrees.

  9. A design study of a reaction control system for a V/STOL fighter/attack aircraft

    NASA Technical Reports Server (NTRS)

    Beard, B. B.; Foley, W. H.

    1983-01-01

    Attention is given to a short takeoff vertical landing (STOVL) aircraft reaction control system (RCS) design study. The STOVL fighter/attack aircraft employs an existing turbofan engine, and its hover requirement places a premium on weight reduction, which eliminates prospective nonairbreathing RCSs. A simple engine compressor bleed RCS degrades overall performance to an unacceptable degree, and the supersonic requirement precludes the large volume alternatives of thermal or ejector thrust augmentation systems as well as the ducting of engine exhaust gases and the use of a dedicated turbojet. The only system which addressed performance criteria without requiring major engine modifications was a dedicated load compressor driven by an auxilliary power unit.

  10. The impact of terrorism on children and adolescents: terror in the skies, terror on television.

    PubMed

    Fremont, Wanda P; Pataki, Caroly; Beresin, Eugene V

    2005-07-01

    Terrorist attacks and their aftermath have had a powerful impact on children and their families. Media and television exposure of terrorist events throughout the world has increased during the past few years. There is increasing concern about the effects of this exposure on children who witness these violent images. To develop a proactive and strategic response to reactions of fear, clinicians, educators, and policy makers must understand the psychologic effects of media coverage of terrorism on children. Previous research has focused on media coverage of criminal violence and war. Recent studies have examined the effect of remote exposure of terrorist attacks and have shown a significant clinical impact on children and families.

  11. Validation of a three-dimensional viscous analysis of axisymmetric supersonic inlet flow fields

    NASA Technical Reports Server (NTRS)

    Benson, T. J.; Anderson, B. H.

    1983-01-01

    A three-dimensional viscous marching analysis for supersonic inlets was developed. To verify this analysis several benchmark axisymmetric test configurations were studied and are compared to experimental data. Detailed two-dimensional results for shock-boundary layer interactions are presented for flows with and without boundary layer bleed. Three dimensional calculations of a cone at angle of attack and a full inlet at attack are also discussed and evaluated. Results of the calculations demonstrate the code's ability to predict complex flow fields and establish guidelines for future calculations using similar codes.

  12. A Blind Reversible Robust Watermarking Scheme for Relational Databases

    PubMed Central

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as “histogram shifting of adjacent pixel difference” (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks. PMID:24223033

  13. A blind reversible robust watermarking scheme for relational databases.

    PubMed

    Chang, Chin-Chen; Nguyen, Thai-Son; Lin, Chia-Chen

    2013-01-01

    Protecting the ownership and controlling the copies of digital data have become very important issues in Internet-based applications. Reversible watermark technology allows the distortion-free recovery of relational databases after the embedded watermark data are detected or verified. In this paper, we propose a new, blind, reversible, robust watermarking scheme that can be used to provide proof of ownership for the owner of a relational database. In the proposed scheme, a reversible data-embedding algorithm, which is referred to as "histogram shifting of adjacent pixel difference" (APD), is used to obtain reversibility. The proposed scheme can detect successfully 100% of the embedded watermark data, even if as much as 80% of the watermarked relational database is altered. Our extensive analysis and experimental results show that the proposed scheme is robust against a variety of data attacks, for example, alteration attacks, deletion attacks, mix-match attacks, and sorting attacks.

  14. An efficient collaborative approach for black hole attack discovery and mitigating its impact in manet

    NASA Astrophysics Data System (ADS)

    Devipriya, K.; Ivy, B. Persis Urbana; Prabha, D.

    2018-04-01

    A mobile ad hoc network (MANET) is an assemblage of nodes composed of mobile devices coupled in various ways wirelessly which do not have any central administration. Each node in MANET cooperates in forwarding packets in the network. This type of collaboration incurs high cost but there exits nodes that declines to cooperate leading to selfish conduct of nodes which effects overall network performance. To discover the attacks caused by such nodes, a renowned mechanism using watchdog can be deployed. In infrastructure less network attack detection and reaction and high false positives, false negatives initiating black hole attack becomes major issue in watchdog. This paper put forward a collaborative approach for identifying such attacks in MANET. Through abstract analysis and extensive simulation of this approach, the detection time of misbehaved nodes is reduced and substantial enhancement in overhead and throughput is witnessed.

  15. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

    PubMed Central

    Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-01-01

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ1 regularization. PMID:29710833

  16. A macro-economic framework for evaluation of cyber security risks related to protection of intellectual property.

    PubMed

    Andrijcic, Eva; Horowitz, Barry

    2006-08-01

    The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.

  17. Quantum steganography with large payload based on entanglement swapping of χ-type entangled states

    NASA Astrophysics Data System (ADS)

    Qu, Zhi-Guo; Chen, Xiu-Bo; Luo, Ming-Xing; Niu, Xin-Xin; Yang, Yi-Xian

    2011-04-01

    In this paper, we firstly propose a new simple method to calculate entanglement swapping of χ-type entangled states, and then present a novel quantum steganography protocol with large payload. The new protocol adopts entanglement swapping to build up the hidden channel within quantum secure direct communication with χ-type entangled states for securely transmitting secret messages. Comparing with the previous quantum steganographies, the capacity of the hidden channel is much higher, which is increased to eight bits. Meanwhile, due to the quantum uncertainty theorem and the no-cloning theorem its imperceptibility is proved to be great in the analysis, and its security is also analyzed in detail, which is proved that intercept-resend attack, measurement-resend attack, ancilla attack, man-in-the-middle attack or even Dos(Denial of Service) attack couldn't threaten it. As a result, the protocol can be applied in various fields of quantum communication.

  18. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ₁ Regularization.

    PubMed

    Hernandez-Suarez, Aldo; Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Perez-Meana, Hector; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-04-29

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.

  19. Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Acin, Antonio; Gisin, Nicolas; Scarani, Valerio

    2004-01-01

    We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantlymore » increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.« less

  20. An infanticide attempt by a free-roaming feral stallion (Equus caballus)

    PubMed Central

    Gray, Meeghan E.

    2008-01-01

    Infanticide by adult males occurs in a variety of species. While infanticidal attacks have been documented in several equid species in captivity, it has never been witnessed in free-roaming feral horses. I report an infanticide attempt by a free-living feral stallion on a recently born female foal. The stallion picked up the foal by the shoulders, tossed it around twice and bit in on the neck several times. The dam of the foal charged the stallion and successfully protected her foal from additional attacks. The foal survived the attack and later weaned successfully. The stallion recently took over the band and was excluded as the sire through genetic analysis. While this type of attack is rare, this case lends support to the sexual selection hypothesis and further demonstrates that equids have evolved with the risk of infanticide. Furthermore, it shows that maternal protectiveness can be successful against attacks by infanticidal males. PMID:19019779

Top