The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Fengli; Li, QInghua; Mantooth, Homer Alan
2016-04-02
According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.
A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks
NASA Astrophysics Data System (ADS)
Gunasekaran, Mahalakshmi; Periakaruppan, Subathra
2017-06-01
Wireless sensor network (WSN) contains the distributed autonomous devices with the sensing capability of physical and environmental conditions. During the clustering operation, the consumption of more energy causes the draining in battery power that leads to minimum network lifetime. Hence, the WSN devices are initially operated on low-power sleep mode to maximise the lifetime. But, the attacks arrival cause the disruption in low-power operating called denial of service (DoS) attacks. The conventional intrusion detection (ID) approaches such as rule-based and anomaly-based methods effectively detect the DoS attacks. But, the energy consumption and false detection rate are more. The absence of attack information and broadcast of its impact to the other cluster head (CH) leads to easy DoS attacks arrival. This article combines the isolation and routing tables to detect the attack in the specific cluster and broadcasts the information to other CH. The intercommunication between the CHs prevents the DoS attacks effectively. In addition, the swarm-based defence approach is proposed to migrate the fault channel to normal operating channel through frequency hop approaches. The comparative analysis between the proposed table-based intrusion detection systems (IDSs) and swarm-based defence approaches with the traditional IDS regarding the parameters of transmission overhead/efficiency, energy consumption, and false positive/negative rates proves the capability of DoS prediction/prevention in WSN.
On Mitigating Distributed Denial of Service Attacks
ERIC Educational Resources Information Center
Gao, Zhiqiang
2006-01-01
Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…
Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine.
Imamverdiyev, Yadigar; Abdullayeva, Fargana
2018-06-01
In this article, the application of the deep learning method based on Gaussian-Bernoulli type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks is considered. To increase the DoS attack detection accuracy, seven additional layers are added between the visible and the hidden layers of the RBM. Accurate results in DoS attack detection are obtained by optimization of the hyperparameters of the proposed deep RBM model. The form of the RBM that allows application of the continuous data is used. In this type of RBM, the probability distribution of the visible layer is replaced by a Gaussian distribution. Comparative analysis of the accuracy of the proposed method with Bernoulli-Bernoulli RBM, Gaussian-Bernoulli RBM, deep belief network type deep learning methods on DoS attack detection is provided. Detection accuracy of the methods is verified on the NSL-KDD data set. Higher accuracy from the proposed multilayer deep Gaussian-Bernoulli type RBM is obtained.
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%. PMID:27494411
Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.
Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae
2016-01-01
The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.
Song, Jae-gu; Jung, Sungmo; Kim, Jong Hyun; Seo, Dong Il; Kim, Seoksoo
2010-01-01
This research suggests a Denial of Service (DoS) detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed. PMID:22163475
Develop a solution for protecting and securing enterprise networks from malicious attacks
NASA Astrophysics Data System (ADS)
Kamuru, Harshitha; Nijim, Mais
2014-05-01
In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Kumar, Sunil; Dutta, Kamlesh
2017-06-01
The routing algorithms in MANETs exhibit distributed and cooperative behaviour which makes them easy target for denial of service (DoS) attacks. RREQ flooding attack is a flooding-type DoS attack in context to Ad hoc On Demand Distance Vector (AODV) routing protocol, where the attacker broadcasts massive amount of bogus Route Request (RREQ) packets to set up the route with the non-existent or existent destination in the network. This paper presents direct trust-based security scheme to detect and mitigate the impact of RREQ flooding attack on the network, in which, every node evaluates the trust degree value of its neighbours through analysing the frequency of RREQ packets originated by them over a short period of time. Taking the node's trust degree value as the input, the proposed scheme is smoothly extended for suppressing the surplus RREQ and bogus RREQ flooding packets at one-hop neighbours during the route discovery process. This scheme distinguishes itself from existing techniques by not directly blocking the service of a normal node due to increased amount of RREQ packets in some unusual conditions. The results obtained throughout the simulation experiments clearly show the feasibility and effectiveness of the proposed defensive scheme.
Geographic Wormhole Detection in Wireless Sensor Networks
Sookhak, Mehdi; Akhundzada, Adnan; Sookhak, Alireza; Eslaminejad, Mohammadreza; Gani, Abdullah; Khurram Khan, Muhammad; Li, Xiong; Wang, Xiaomin
2015-01-01
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS) attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS) attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP). The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS), Authentication of Nodes Scheme (ANS), Wormhole Detection uses Hound Packet (WHOP), and Wormhole Detection with Neighborhood Information (WDI) using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR) in the geographic routing protocols. PMID:25602616
Attacks on Bluetooth Security Architecture and Its Countermeasures
NASA Astrophysics Data System (ADS)
Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif
WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.
Saleh, Mohammed A; Abdul Manaf, Azizah
2015-01-01
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.
Saleh, Mohammed A.; Abdul Manaf, Azizah
2015-01-01
The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks. PMID:26065015
DoS detection in IEEE 802.11 with the presence of hidden nodes
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2013-01-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm. PMID:25685510
DoS detection in IEEE 802.11 with the presence of hidden nodes.
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2014-07-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
On securing wireless sensor network--novel authentication scheme against DOS attacks.
Raja, K Nirmal; Beno, M Marsaline
2014-10-01
Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.
Filtering methods for broadcast authentication against PKC-based denial of service in WSN: a survey
NASA Astrophysics Data System (ADS)
Afianti, Farah; Wirawan, Iwan; Suryani, Titiek
2017-11-01
Broadcast authentication is used to determine legitimate packet from authorized user. The received packet can be forwarded or used for the further purpose. The use of digital signature is one of the compromising methods but it is followed by high complexity especially in the verification process. That phenomenon is used by the adversary to force the user to verify a lot of false packet data. Kind of Denial of Service (DoS) which attacks the main signature can be mitigated by using pre-authentication methods as the first layer to filter false packet data. The objective of the filter is not replacing the main signature but as an addition to actual verification in the sensor node. This paper contributes in comparing the cost of computation, storage, and communication among several filters. The result shows Pre- Authenticator and Dos Attack-Resistant scheme have the lower overhead than the others. Thus followed by needing powerful sender. Moreover, the key chain is promising methods because of efficiency and effectiveness.
Towards Quantifying Programmable Logic Controller Resilience Against Intentional Exploits
2012-03-22
may improve the SCADA system’s resilience against DoS and man-in-the-middle ( MITM ) attacks. DoS attacks may be mitigated by using the redundant...paths available on the network links. MITM attacks may be mitigated by the data integrity checks associated with the middleware. Figure 4 illustrates
Quantum steganography with large payload based on entanglement swapping of χ-type entangled states
NASA Astrophysics Data System (ADS)
Qu, Zhi-Guo; Chen, Xiu-Bo; Luo, Ming-Xing; Niu, Xin-Xin; Yang, Yi-Xian
2011-04-01
In this paper, we firstly propose a new simple method to calculate entanglement swapping of χ-type entangled states, and then present a novel quantum steganography protocol with large payload. The new protocol adopts entanglement swapping to build up the hidden channel within quantum secure direct communication with χ-type entangled states for securely transmitting secret messages. Comparing with the previous quantum steganographies, the capacity of the hidden channel is much higher, which is increased to eight bits. Meanwhile, due to the quantum uncertainty theorem and the no-cloning theorem its imperceptibility is proved to be great in the analysis, and its security is also analyzed in detail, which is proved that intercept-resend attack, measurement-resend attack, ancilla attack, man-in-the-middle attack or even Dos(Denial of Service) attack couldn't threaten it. As a result, the protocol can be applied in various fields of quantum communication.
Defending networks against denial-of-service attacks
NASA Astrophysics Data System (ADS)
Gelenbe, Erol; Gellman, Michael; Loukas, George
2004-11-01
Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.
FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.
N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash
2016-01-01
Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.
Wu, Fan; Xu, Lili
2013-08-01
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.
Baig, Ahmed Fraz; Hassan, Khwaja Mansoor Ul; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Khan, Imran; Ashraf, Muhammad Usman
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.'s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols.
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
2018-01-01
Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication is also accompanied by new security threats and challenges. A threat-proof authentication protocol in wireless communication may overcome the security flaws by allowing only legitimate users to access a particular service. Recently, Lee et al. found Mun et al. scheme vulnerable to different attacks and proposed an advanced secure scheme to overcome the security flaws. However, this article points out that Lee et al. scheme lacks user anonymity, inefficient user authentication, vulnerable to replay and DoS attacks and Lack of local password verification. Furthermore, this article presents a more robust anonymous authentication scheme to handle the threats and challenges found in Lee et al.’s protocol. The proposed protocol is formally verified with an automated tool(ProVerif). The proposed protocol has superior efficiency in comparison to the existing protocols. PMID:29702675
FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET
N. Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash
2016-01-01
Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks. PMID:27285146
Authenticated IGMP for Controlling Access to Multicast Distribution Tree
NASA Astrophysics Data System (ADS)
Park, Chang-Seop; Kang, Hyun-Sun
A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
A study of IEEE 802.15.4 security framework for wireless body area networks.
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358
Analyzing Cyber-Physical Threats on Robotic Platforms.
Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J
2018-05-21
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.
Analyzing Cyber-Physical Threats on Robotic Platforms †
2018-01-01
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403
Self-enforcing Private Inference Control
NASA Astrophysics Data System (ADS)
Yang, Yanjiang; Li, Yingjiu; Weng, Jian; Zhou, Jianying; Bao, Feng
Private inference control enables simultaneous enforcement of inference control and protection of users' query privacy. Private inference control is a useful tool for database applications, especially when users are increasingly concerned about individual privacy nowadays. However, protection of query privacy on top of inference control is a double-edged sword: without letting the database server know the content of user queries, users can easily launch DoS attacks. To assuage DoS attacks in private inference control, we propose the concept of self-enforcing private inference control, whose intuition is to force users to only make inference-free queries by enforcing inference control themselves; otherwise, penalty will inflict upon the violating users.
Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection
NASA Astrophysics Data System (ADS)
Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang
Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.
Elhai, Jon D; Jacobs, Gerard A; Kashdan, Todd B; DeJong, Gary L; Meyer, David L; Frueh, B Christopher
2006-06-30
In this article, we explored 1) the extent of mental health (MH) service use by American Red Cross disaster relief workers, both before (lifetime) and 1 year after the September 11, 2001 terrorist attacks, and 2) demographic, disaster and MH variables predicting (1-year) post-September 11 MH service use in this population. A sample of 3015 Red Cross disaster workers was surveyed 1 year after the attacks, regarding demographic characteristics, MH service use before and since the attacks, and posttraumatic stress disorder (PTSD) symptoms. Findings revealed that while 13.5% used MH services before the attacks, 10.7% used services after. Variables increasing the likelihood of MH service use after the attacks included the following: no previous MH treatment, younger age, being divorced/widowed, and higher PTSD intrusion or hyperarousal symptoms. Findings support other recent research on MH service use after the September 11 attacks.
Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Yu T. (Jade
Wireless ad hoc networks have fundamentally altered today's battlefield, with applications ranging from unmanned air vehicles to randomly deployed sensor networks. Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments.
Passive and Active Analysis in DSR-Based Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Dempsey, Tae; Sahin, Gokhan; Morton, Y. T. (Jade)
Security and vulnerabilities in wireless ad hoc networks have been considered at different layers, and many attack strategies have been proposed, including denial of service (DoS) through the intelligent jamming of the most critical packet types of flows in a network. This paper investigates the effectiveness of intelligent jamming in wireless ad hoc networks using the Dynamic Source Routing (DSR) and TCP protocols and introduces an intelligent classifier to facilitate the jamming of such networks. Assuming encrypted packet headers and contents, our classifier is based solely on the observable characteristics of size, inter-arrival timing, and direction and classifies packets with up to 99.4% accuracy in our experiments. Furthermore, we investigate active analysis, which is the combination of a classifier and intelligent jammer to invoke specific responses from a victim network.
Attacks on public telephone networks: technologies and challenges
NASA Astrophysics Data System (ADS)
Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet
2003-09-01
Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.
NASA Astrophysics Data System (ADS)
Sridevi, B.; Supriya, T. S.; Rajaram, S.
2013-01-01
The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.
Use of Optical Storage Devices as Shared Resources in Local Area Networks
1989-09-01
13 3. SERVICE CALLS FOR MS-DOS CD-ROM EXTENSIONS . 14 4. MS-DOS PRIMITIVE GROUPS ....................... 15 5. RAM USAGE FOR VARIOUS LAN...17 2. Service Call Translation to DOS Primitives ............. 19 3. MS-DOS Device Drivers ............................. 21 4. MS-DOS/ROM...directed to I/O devices will be referred to as primitive instruction groups). These primitive instruction groups include keyboard, video, disk, serial
Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan
2016-12-01
Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.
47 CFR 76.1612 - Personal attack.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of...
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
NASA Astrophysics Data System (ADS)
Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka
Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.
Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals
NASA Astrophysics Data System (ADS)
Luo, Xiapu; Chan, Edmond W. W.; Chang, Rocky K. C.
2009-12-01
This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).
Vulnerability of water supply systems to cyber-physical attacks
NASA Astrophysics Data System (ADS)
Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi
2016-04-01
The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
Analytical Characterization of Internet Security Attacks
ERIC Educational Resources Information Center
Sellke, Sarah H.
2010-01-01
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
Web Forms and Untraceable DDoS Attacks
NASA Astrophysics Data System (ADS)
Jakobsson, Markus; Menczer, Filippo
We analyze a Web vulnerability that allows an attacker to perform an email-based attack on selected victims, using standard scripts and agents. What differentiates the attack we describe from other, already known forms of distributed denial of service (DDoS) attacks is that an attacker does not need to infiltrate the network in any manner - as is normally required to launch a DDoS attack. Thus, we see this type of attack as a poor man's DDoS. Not only is the attack easy to mount, but it is also almost impossible to trace back to the perpetrator. Along with descriptions of our attack, we demonstrate its destructive potential with (limited and contained) experimental results. We illustrate the potential impact of our attack by describing how an attacker can disable an email account by flooding its inbox; block competition during on-line auctions; harm competitors with an on-line presence; disrupt phone service to a given victim; disconnect mobile corporate leaders from their networks; and disrupt electronic elections. Finally, we propose a set of countermeasures that are light-weight, do not require modifications to the infrastructure, and can be deployed in a gradual manner.
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-01-01
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-11-04
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-19
... POSTAL SERVICE 39 CFR Part 501 Revisions to the Requirements for Authority To Manufacture and Distribute Postage Evidencing Systems AGENCY: Postal Service TM . ACTION: Final rule. SUMMARY: This rule... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.
Ghanti, Shaila; Naik, G M
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.
Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System
Ghanti, Shaila
2016-01-01
Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2014 CFR
2014-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2013 CFR
2013-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
39 CFR 501.11 - Reporting Postage Evidencing System security weaknesses.
Code of Federal Regulations, 2012 CFR
2012-07-01
... any repeatable deviation from normal Postage Evidencing System performance. (3) Cyber attacks that... misappropriating assets or sensitive information, corrupting data, or causing operational disruption. Cyber attacks... causing denial-of-service attacks on Web sites. Cyber attacks may be carried out by third parties or...
Protecting Database Centric Web Services against SQL/XPath Injection Attacks
NASA Astrophysics Data System (ADS)
Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique
Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
47 CFR 76.209 - Fairness doctrine; personal attacks; political editorials.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 4 2010-10-01 2010-10-01 false Fairness doctrine; personal attacks; political editorials. 76.209 Section 76.209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Cablecasting § 76.209 Fairness doctrine...
Panic attacks and panic disorder in a population-based sample of active Canadian military personnel.
Kinley, D Jolene; Walker, John R; Mackenzie, Corey S; Sareen, Jitender
2011-01-01
The factors contributing to psychiatric problems among military personnel, particularly for panic, are unclear. The objective of this study was to examine the prevalence and correlates of panic disorder and panic attacks in the Canadian military. Statistics Canada and the Department of National Defense conducted the Canadian Community Health Survey-Canadian Forces Supplement in 2002 (May to December) with a representative sample of active Canadian military personnel (aged 16-54 years; N = 8,441; response rate, 81.5%). Comparisons were made between respondents with no past-year panic attacks, panic attacks without panic disorder, and panic disorder on measures of DSM-IV mental disorders, as well as validated measures of disability, distress, suicidal ideation, perceived need for mental health treatment, and mental health service use. Lifetime exposure to combat operations, witnessing of atrocities, and deployments were also assessed. Panic disorder and panic attacks were common in the military population, with past-year prevalence estimates of 1.8% and 7.0%, respectively. Both panic disorder and panic attacks were associated with increased odds of all mental disorders assessed, suicidal ideation, 2-week disability, and distress. Perceived need for mental health treatment and service use were common in individuals with panic attacks and panic disorder (perceived need: 46.3% for panic attacks, 89.6% for panic disorder; service use: 32.5% for panic attacks, 74.5% for panic disorder). Panic attacks and panic disorder in the military are associated with outcomes that could be detrimental to well-being and work performance, and early detection of panic in this population could help reduce these negative outcomes. © Copyright 2011 Physicians Postgraduate Press, Inc.
2015-04-01
suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway... Service Auditors General to coordinate their oversight and avoid duplication of effort. Section 8L provides a new mandate for the three Lead IG...SUMMARY 7 • Medical Support Service in Iraq (DoS OIG). DoS OIG issued a manage- ment assistance report on concerns with oversight of medical support
Comparing Reactivation Behavior of TIG and Laser Beam Welded Alloy 690
NASA Astrophysics Data System (ADS)
Abraham, Geogy J.; Bhambroo, Rajan; Kain, V.; Dey, G. K.; Raja, V. S.
2013-02-01
The nickel base Alloy 690 was subjected to simulated autogenous welding treatment employing two different techniques, laser beam welding (LBW) and tungsten inert gas (TIG) welding. The resultant weld fusion zone (WFZ) and heat-affected zone (HAZ) were compared by studying the reactivation behavior. The chromium depletion effect was assessed by measuring the degree of sensitization (DOS) from the electrochemical potentiodynamic reactivation (EPR) test. A double-loop EPR test for Alloy 690 was employed to measure the DOS at different regions of weldments by masking the remaining regions. The results clearly demonstrated that Alloy 690 showed no sensitization in the parent material and the WFZ region of both TIG and laser weldments. However, it exhibited reactivation in the HAZ region of both the weldments. The DOS values measured for Alloy 690 were very low for all the regions of the LBW weldment as compared to that in the TIG weldment. The HAZ region of the LBW weldment showed the highest DOS value in any region of the weldment but even this value was quite low indicating absence of sensitization in LBW weldment. The attack along the grain boundaries for the weldments after EPR experiments were studied using optical and scanning electron microscopy.
Situational awareness of a coordinated cyber attack
NASA Astrophysics Data System (ADS)
Sudit, Moises; Stotz, Adam; Holender, Michael
2005-03-01
As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.
Protecting Dynamic Mobile Agent against Denial of Service Attacks
NASA Astrophysics Data System (ADS)
Aggarwal, Mayank; Nipur, Pallavi
2010-11-01
Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.
Advanced Protected Services: A Concept Paper on Survivable Service-Oriented Systems
2010-05-07
resiliency and protection of such systems to a level where they can withstand sustained attacks from well-motivated adversaries. In this paper we...that are designed for the protection of systems that are based on service-oriented architectures. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF...resilient against malicious attacks , and to demonstrate the utility of the developed advanced protection techniques in settings that exhibit various
Disaster planning and emergency preparedness: lessons learned.
Babb, John; Tosatto, Robert; Hayslett, James
2002-01-01
Following the terrorist attacks of September 11, 2001, the federal response plan was activated immediately, with most efforts focused on helping recovery workers at Ground Zero in New York City. Comprehensive pharmacy services were critical in protecting the health of those potentially exposed to anthrax at U.S. Postal Service facilities and the U.S. Capitol. Responding to anthrax attacks taught many valuable lessons to emergency workers on how to manage a bioterrorist attack. Because of its central place in the life of many American communities, pharmacy is a natural and important ally of public health.
Novel mechanism of network protection against the new generation of cyber attacks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit
2012-06-01
A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.
VTAC: virtual terrain assisted impact assessment for cyber attacks
NASA Astrophysics Data System (ADS)
Argauer, Brian J.; Yang, Shanchieh J.
2008-03-01
Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).
NASA Astrophysics Data System (ADS)
Liu, Peng
High temperature hydrogen attack (HTHA) is a form of surface decarburization, internal decarburization, and/or intergranular cracking in steels exposed to high temperature (>400°F) and high hydrogen pressure. Hydrogen attack is an irreversible process which can cause permanent damage resulting in degradation of mechanical properties and failures such as leakage, bursting, fire, and/or explosion. The continuous progression of hydrogen attack in C-0.5Mo steel and weldments below the C-0.5Mo Nelson Curve has caused a significant concern for the integrity and serviceability of C-0.5Mo steel utilized for pressure vessels and piping in the petroleum refinery and petrochemical industries. A state-of-the-art literature review was implemented to provide a comprehensive overview of the published research efforts on hydrogen attack studies. The evolution of "Nelson Curves" for carbon steel, C-0.5Mo, and Cr-Mo steels was historically reviewed in regard to design applications and limitations. Testing techniques for hydrogen attack assessment were summarized under the categories of hydrogen exposure testing, mechanical evaluation, and dilatometric swelling testing. In accord with the demands of these industries, fundamental studies of hydrogen attack in C-0.5Mo steel and weldments were accomplished in terms of quantitative methodologies for hydrogen damage evaluation; hydrogen damage assessment of service exposed weldments and autoclave exposed materials; effects of carbon and alloying elements, heat treatments, hot and cold working, welding processes and postweld heat treatment (PWHT) on hydrogen attack susceptibility; development of continuous cooling transformation (CCT) diagrams for C-0.5Mo base metals and the coarse grained heat-affected zone (CGHAZ); carbide evaluation for the C-0.5Mo steel after service exposure and heat treatment; methane evolution by the reaction of hydrogen and carbides; hydrogen diffusion and methane pressure through the wall thickness of one-sided hydrogen exposure assembly; hydrogen attack mechanism and hydrogen attack limit modeling.
Dalby, Miles; Whitbread, Mark
2013-08-22
Early ambulance services often confined their activities to a "scoop and run" approach, conveying sick patients quickly to the nearest emergency department. With the advent of modern ST-elevation myocardial infarction (STEMI) management and primary percutaneous coronary intervention (PPCI), the role of the emergency medical service (EMS) has expanded significantly. This review discusses the critical and evolving collaboration between the EMS and the heart attack centre. Speed of reperfusion is a major determinant of outcome in STEMI and, whilst the patient delay (symptom to call time) has a central role in this, system delay (first medical contact to balloon time) is linked to mortality and is used to measure the response of a PPCI programme and is a key element of contemporary guidelines. In addition to rapid diagnosis and transfer to the heart attack centre, the EMS has to deliver a growing number of established treatments including resuscitation and drug therapy. EMS also continually needs to develop expertise in new techniques such as advanced management of cardiac arrest patients, including automated cardiopulmonary resuscitation, and will need to deliver newer therapies if trials support their use, including cooling and preconditioning. Ultimately, the EMS has a central role in the management of STEMI patients which needs to be fully aligned with the heart attack centres. This integration of services is perhaps best regarded as the Heart Attack Team.
Characterization of attacks on public telephone networks
NASA Astrophysics Data System (ADS)
Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet
2001-02-01
The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.
Depletion-of-Battery Attack: Specificity, Modelling and Analysis.
Shakhov, Vladimir; Koo, Insoo
2018-06-06
The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.
Aftermath of bustamante attack on genomic beacon service.
Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman
2017-07-26
With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.
Enhanced diffie-hellman algorithm for reliable key exchange
NASA Astrophysics Data System (ADS)
Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj
2017-11-01
The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
NASA Astrophysics Data System (ADS)
You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki
Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bobyshev, A.; Lamore, D.; Demar, P.
2004-12-01
In a large campus network, such at Fermilab, with tens of thousands of nodes, scanning initiated from either outside of or within the campus network raises security concerns. This scanning may have very serious impact on network performance, and even disrupt normal operation of many services. In this paper we introduce a system for detecting and automatic blocking excessive traffic of different kinds of scanning, DoS attacks, virus infected computers. The system, called AutoBlocker, is a distributed computing system based on quasi-real time analysis of network flow data collected from the border router and core switches. AutoBlocker also has anmore » interface to accept alerts from IDS systems (e.g. BRO, SNORT) that are based on other technologies. The system has multiple configurable alert levels for the detection of anomalous behavior and configurable trigger criteria for automated blocking of scans at the core or border routers. It has been in use at Fermilab for about 2 years, and has become a very valuable tool to curtail scan activity within the Fermilab campus network.« less
NASA Astrophysics Data System (ADS)
Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie
2018-01-01
The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.
Development and Analysis of Security Policies in Security Enhanced Android
2012-12-01
Privilege - Escalation Attacks on Android ,” Proc. 19th Annual...Services, Bethesda, MD, 2011, pp. 239–252. 98 [43] L. Davi, et al. “ Privilege Escalation Attacks on Android ,” Proc. 13th Int. Conf. on Information...TaintDroid. XManDroid dynamically analyzes applications’ transitive permission usage in order to prevent application-level privilege escalation attacks
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... Countermeasures Following a Biological Attack By the authority vested in me as President by the Constitution and... countermeasures to the American people in the event of a biological attack in the United States through a rapid.... Postal Service medical countermeasures dispensing model to respond to a large-scale biological attack. (b...
1993-04-01
instead of attacking the causes. The 1991 Act is a law of stratification that encourages racism , sexism , and litigation to further individual goals and...30 D. What About Those Statistics ? ............................ 31 E. Race Norming - The Dos and Don’ts of Test Scores...in Title VII to recognize group rights through a "disparate impact" theory of discrimination. In Griggs v. Duke Power Co.,` the Court recognized that
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat
The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility onmore » enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.« less
Tongpeth, Jintana; Du, Huiyun; Clark, Robyn
2018-06-19
To evaluate the effectiveness of an interactive, avatar based education application to improve knowledge of and response to heart attack symptoms in people who are at risk of a heart attack. Poor knowledge of heart attack symptoms is recognised as a significant barrier to timely medical treatment. Numerous studies have demonstrated that technology can assist in patient education to improve knowledge and self-care. A single-center, non-blinded, two parallel groups, pragmatic randomized controlled trial. Seventy patients will be recruited from the coronary care unit of a public hospital. Eligible participants will be randomised to either the usual care or the intervention group (usual care plus avatar-based heart attack education app). The primary outcome of this study is knowledge. Secondary outcomes include response to heart attack symptoms, health service use and satisfaction. Study participants will be followed-up for six months. This study will evaluate the avatar based education app as a method to deliver vital information to patients. Participants' knowledge of and response to heart attack symptoms, as well as their health service use, will be assessed to evaluate the intervention effectiveness. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.
Novel Method For Low-Rate Ddos Attack Detection
NASA Astrophysics Data System (ADS)
Chistokhodova, A. A.; Sidorov, I. D.
2018-05-01
The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.
Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment
NASA Astrophysics Data System (ADS)
Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung
2016-07-01
Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.
Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram
2015-11-01
Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.
2009-03-01
time and the router CPU loads are comparable to those reported by two former NPS theses that examined alternative solutions based on BGP blackhole ...routing. 15. NUMBER OF PAGES 135 14. SUBJECT TERMS Traffic Engineering, Distributed Denial of Service Attacks, Sinkhole Routing, Blackhole Routing...alternative solutions based on BGP blackhole routing. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION
Walter Reed Army Medical Center's mental health response to the Pentagon attack.
Cozza, Stephen J; Huleatt, William J; James, Larry C
2002-09-01
The September 11 terrorist attack on the Pentagon captured the attention and concern of America as well as the world. Given the extent of devastation, and the number of deaths at the Pentagon, it was believed that the uniformed mental health services would serve a pivotal role in the recovery and relief efforts. This article provides a synopsis of the complex and multidisciplinary mental health services provided by Walter Reed Army Medical Center in the wake of the September 11 attack on the Pentagon. This article offers an overview of the functions and roles of mental health team members, describes a constellation of services rendered, and describes how missions differed inside and outside of the Pentagon. Additionally, the authors provide the reader with how services were provided at the Family Assistance Center to family members of those killed during the attack. Liaison with civilian medical, mental health, and relief agencies and facilities will be discussed as well. The mental health response was an intensive and complicated experience and has yielded many lesson learned. To this end, the authors will provide the reader with an understanding of how the lessons learned during this mission may assist mental health commanders and leaders in planning and responding to similar deployments in the future.
Napier, Richard J; Gallagher, Brendan J; Wilson, Darrin S
2017-01-01
ABSTRACT Background: The 1994 Northern Ireland ceasefire heralded a new beginning for the region after 30-years of violence. In the 20-years following the cessation of hostilities, paramilitary punishment attacks continue to occur in breach of the ceasefire. The aim of this study was to review trends in these attacks over the 20-years and their impact on orthopaedic services. Methods: We conducted a retrospective review of patients admitted under orthopaedic services following paramilitary assault across Northern Ireland over the last 20-years. The frequency of assaults, demographics of the victim population, injury pattern and weapons used was determined. Data on the total number of attacks was obtained from the Police Service for Northern Ireland (PSNI). Results: 3691 paramilitary style attacks occurred between 1994 and 2014 despite bilateral ceasefires. The overwhelming majority of attacks are on males, however females and children as young as 12 have been victims. Prior to 1994, penetrating trauma predominated (62% vs 38%), with blunt trauma more common post ceasefire (60% vs 40%). 33% of those injured required orthopaedic treatment. The type of weapon used in these assaults has changed primarily from ballistic to non-ballistic devices. Conclusions: We present data of paramilitary related trauma presenting to orthopaedic services across Northern Ireland in the 20-years since the conclusion of hostilities following the negotiated 1994 ceasefire. Many assaults continue to occur despite being in breach of the ceasefire. The frequency of these assaults is however, declining. The type of weapons used has changed resulting in less ballistic trauma and more blunt trauma. The injury pattern associated with blunt trauma has significant long-term morbidity and potentially a greater financial burden on the health service. Implications: 20-years of peace in Northern Ireland has had a hugely positive impact on the political and financial stability of the region. Unfortunately, continued violence represents a significant burden on the health service resources and causes potential long-term changes to victim’s lives. PMID:29535480
Emergency Mental Health Services for Children After the Terrorist Attacks of September 11, 2001.
Bruckner, Tim A; Kim, Yonsu; Lubens, Pauline; Singh, Amrita; Snowden, Lonnie; Chakravarthy, Bharath
2016-01-01
Much literature documents elevated psychiatric symptoms among adults after the terrorist attacks of September 11, 2001 (9/11). We, however, know of no research in children that examines emergency mental health services following 9/11. We test whether children's emergency services for crisis mental health care rose above expected values in September 2001. We applied time-series methods to California Medicaid claims (1999-2003; N = 127,200 visits). Findings in California indicate an 8.7% increase of children's emergency mental health visits statistically attributable to 9/11. Non-Hispanic white more than African American children account for this acute rise in emergency services.
Securing internet by eliminating DDOS attacks
NASA Astrophysics Data System (ADS)
Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.
2017-11-01
The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.
Ozbay, Fatih; Auf der Heyde, Tanja; Reissman, Dori; Sharma, Vansh
2013-09-01
The authors review the existing literature on the mental health impact of the September 11th attacks and the implications for disaster mental health clinicians and policy makers. The authors discuss the demographic characteristics of those affected and the state of mental health needs and existing mental health delivery services; the nature of the disaster and primary impacts on lives, infrastructure, and socioeconomic factors; the acute aftermath in the days and weeks after the attacks; the persistent mental health impact and evolution of services of the postacute aftermath; and the implications for future disaster mental health practitioners and policy makers. Copyright © 2013 Elsevier Inc. All rights reserved.
Mental health impact of the World Trade Center attacks on displaced Chinese workers.
Thiel de Bocanegra, Heike; Brickman, Ellen
2004-02-01
To identify psychological sequelae of the World Trade Center attacks in immigrant Chinese displaced workers, we interviewed 77 displaced workers in May 2002. One third of the sample was classified as at least moderately depressed, and 21% met diagnostic criteria for posttraumatic stress disorder; however, few had utilized mental health services. Depression and PTSD scores were positively correlated with age, age at immigration to the United States, and prescription drug use after September 11th, among other variables. Results suggest the need for mental health outreach in this community. This outreach should target both displaced workers and their informal support networks to facilitate identification of and service access for those impacted by the attacks.
Seven Deadliest Network Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Prowell, Stacy J; Borkin, Michael; Kraus, Robert
2010-05-01
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, findmore » out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.« less
2002-01-01
Submitted to ICN 2002 Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks1 Ranga S. Ramanujan ...using these techniques is also described. Contact author: Dr. Ranga S. Ramanujan Architecture Technology Corporation 9971 Valley View Road Eden Prairie...OF ABSTRACT 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE unclassified
Management of victims of urban chemical attack: the French approach.
Laurent, J F; Richter, F; Michel, A
1999-10-01
Since the early 1980s several disasters involving mass release of toxic substances have focused the attention of different administrations and the fire services into producing protocols and guidelines for action in civilian situations. The bomb attack in the Tokyo subway, in March 1995, made it clear that a terrorist attack using highly toxic agents is now feasible. Management of disasters in the civil sector in France is based upon two interlinked plans: the Red Plan, which covers on-site organisation, and the White Plan, which concerns the interface with hospital services. Special procedures have been developed to adapt the Red and White Plans for use in the event of toxic attack and concern the deployment of emergency responding personnel, the provision of life support and antidotes in the contaminated zone, the prevention of secondary contamination and the transport and reception of victims at the hospital. Based on the established principle of pre-hospital resuscitation and well-tried assistance plans, this doctrine allows a safe and effective response to terrorist attacks as well as to other toxic release incidents.
Outdoor Air Pollution, Heart Attack and Stroke
Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...
NASA Astrophysics Data System (ADS)
Peng, Chaorong; Chen, Chang Wen
2008-04-01
Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.
2016-11-01
Target Attack Radar System Objective We determined whether the Air Force made cost-effective purchases on the performance-based logistics contract to... contract to Northrop Grumman Corporation to provide Total System Support Responsibility services to sustain 16 E-8C JSTARS aircraft. These services...customer support. The Total System Support Responsibility contract is valued at $7 billion, with a 6-year base period and 16 annual contract option
Security Assessment of Cyberphysical Digital Microfluidic Biochips.
Ali, Sk Subidh; Ibrahim, Mohamed; Sinanoglu, Ozgur; Chakrabarty, Krishnendu; Karri, Ramesh
2016-01-01
A digital microfluidic biochip (DMFB) is an emerging technology that enables miniaturized analysis systems for point-of-care clinical diagnostics, DNA sequencing, and environmental monitoring. A DMFB reduces the rate of sample and reagent consumption, and automates the analysis of assays. In this paper, we provide the first assessment of the security vulnerabilities of DMFBs. We identify result-manipulation attacks on a DMFB that maliciously alter the assay outcomes. Two practical result-manipulation attacks are shown on a DMFB platform performing enzymatic glucose assay on serum. In the first attack, the attacker adjusts the concentration of the glucose sample and thereby modifies the final result. In the second attack, the attacker tampers with the calibration curve of the assay operation. We then identify denial-of-service attacks, where the attacker can disrupt the assay operation by tampering either with the droplet-routing algorithm or with the actuation sequence. We demonstrate these attacks using a digital microfluidic synthesis simulator. The results show that the attacks are easy to implement and hard to detect. Therefore, this work highlights the need for effective protections against malicious modifications in DMFBs.
Fang, Jing; Gillespie, Cathleen; Keenan, Nora L; Greenlund, Kurt J
2011-05-01
Timely access to emergency care, prompt receipt of advanced treatment and survival from heart attack is dependent on both the early recognition of heart attack symptoms, by both victims and bystanders, and by immediately calling the emergency services. The objective of this study is to measure the awareness of heart attack symptoms and the emergency response among US adults. We analyzed data from the Behavioral Risk Factor Surveillance System's module on heart attack and stroke, which was conducted in 17 states/territories in 2001 and 12 states/territories in 2007. The module included five questions related to heart attack symptoms, one decoy question and one question regarding the first action to take if someone is having a heart attack. Age-adjusted prevalence of awareness was estimated, and odds ratios were calculated. Differences between 2001 and 2007 were assessed for five states that used the module in both years. In 2007, among 76,864 adults, awareness of individual heart attack symptoms ranged from 49% (pain in jaw, neck or back) to 92% (chest pain). Although 97% of adults recognized at least one symptom, only 10.7% recognized all five symptoms, knew that 'sudden trouble seeing in one or both eyes' was not a symptom of heart attack and recognized the need to call the emergency services. This estimate varied significantly by age, sex, race/ethnicity and level of education. The estimate was significantly higher for women (12.2%) than men (7.7%), White (11.6%) than Black (5.7%) or Hispanic people (4.5%), those with a higher level of education (13.5%) than lower educational level (4.5%) and for those with coronary heart disease (16.2%) than without the disease (9.5%). Comparison of awareness between 2001 (the referent) and 2007, in five states, revealed that awareness of all symptoms and calling the emergency services, were 9.7 and 10.3% for 2001 and 2007, respectively (p < 0.01). Compared to 2001, the odds ratio of awareness in 2007 was 1.08 (95% CI: 0.99-1.19) after controlling for socioeconomic and clinical characteristics. Awareness of all heart attack symptoms among adults in 12 states was low and little improvement was observed between 2001 and 2007. Accordingly, both clinicians and public health officials should seek ways in order to increase public awareness of the symptoms of heart attack. Special efforts should be focused on men, Black and Hispanic people and those with only modest levels of education.
Modeling and Managing Risk in Billing Infrastructures
NASA Astrophysics Data System (ADS)
Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele
This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.
Predicting the remaining service life of concrete
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clifton, J.F.
1991-11-01
Nuclear power plants are providing, currently, about 17 percent of the U.S. electricity and many of these plants are approaching their licensed life of 40 years. The U.S. Nuclear Regulatory Commission and the Department of Energy`s Oak Ridge National Laboratory are carrying out a program to develop a methodology for assessing the remaining safe-life of the concrete components and structures in nuclear power plants. This program has the overall objective of identifying potential structural safety issues, as well as acceptance criteria, for use in evaluations of nuclear power plants for continued service. The National Institute of Standards and Technology (NIST)more » is contributing to this program by identifying and analyzing methods for predicting the remaining life of in-service concrete materials. This report examines the basis for predicting the remaining service lives of concrete materials of nuclear power facilities. Methods for predicting the service life of new and in-service concrete materials are analyzed. These methods include (1) estimates based on experience, (2) comparison of performance, (3) accelerated testing, (4) stochastic methods, and (5) mathematical modeling. New approaches for predicting the remaining service lives of concrete materials are proposed and recommendations for their further development given. Degradation processes are discussed based on considerations of their mechanisms, likelihood of occurrence, manifestations, and detection. They include corrosion, sulfate attack, alkali-aggregate reactions, frost attack, leaching, radiation, salt crystallization, and microbiological attack.« less
48 CFR 609.406-3 - Procedures.
Code of Federal Regulations, 2010 CFR
2010-10-01
... statement from each DOS organizational element affected by the debarment action as to the impact of a... is responsible for making the transcribed record of the hearing, unless the contractor and the fact... decision to each DOS organizational element affected by the decision and to the General Services...
Workplace response of companies exposed to the 9/11 World Trade Center attack: a focus-group study
North, Carol S.; Pfefferbaum, Betty; Hong, Barry A.; Gordon, Mollie R.; Kim, You-Seung; Lind, Lisa; Pollio, David E.
2014-01-01
The terrorist attacks of 11 September 2001 (9/11) left workplaces in pressing need of a mental health response capability. Unaddressed emotional sequelae may be devastating to the productivity and economic stability of a company’s workforce. In the second year after the attacks, 85 employees of five highly affected agencies participated in 12 focus groups to discuss workplace mental health issues. Managers felt ill prepared to manage the magnitude and the intensity of employees’ emotional responses. Rapid return to work, provision of workplace mental health services, and peer support were viewed as contributory to emotional recovery. Formal mental health services provided were perceived as insufficient. Drawing on their post-9/11 workplace experience, members of these groups identified practical measures that they found helpful in promoting healing outside of professional mental health services. These measures, consistent with many principles of psychological first aid, may be applied by workplace leaders who are not mental health professionals. PMID:23066661
Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.
Johnson, Chris W
2014-01-01
We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.
Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks
NASA Astrophysics Data System (ADS)
Seedorf, Jan; Beckers, Kristian; Huici, Felipe
The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.
NASA Astrophysics Data System (ADS)
Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo
More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.
Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf
2016-07-01
Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes.
Finite Energy and Bounded Attacks on Control System Sensor Signals
DOE Office of Scientific and Technical Information (OSTI.GOV)
Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M
Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signalmore » attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.« less
7 CFR 318.13-5 - Pest-free areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE... plant pests that attack the fruits or vegetables. In other cases, fruits or vegetables may be moved interstate if the area of origin is free of one or more plant pests that attack the fruit or vegetable and...
7 CFR 318.13-5 - Pest-free areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE... plant pests that attack the fruits or vegetables. In other cases, fruits or vegetables may be moved interstate if the area of origin is free of one or more plant pests that attack the fruit or vegetable and...
7 CFR 318.13-5 - Pest-free areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE... plant pests that attack the fruits or vegetables. In other cases, fruits or vegetables may be moved interstate if the area of origin is free of one or more plant pests that attack the fruit or vegetable and...
7 CFR 318.13-5 - Pest-free areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Regulations of the Department of Agriculture (Continued) ANIMAL AND PLANT HEALTH INSPECTION SERVICE... plant pests that attack the fruits or vegetables. In other cases, fruits or vegetables may be moved interstate if the area of origin is free of one or more plant pests that attack the fruit or vegetable and...
ERIC Educational Resources Information Center
Violino, Bob
2010-01-01
The FBI, in partnership with the U.S. Department of Education and the U.S. Secret Service, recently released a report on violent attacks on college campuses that details ongoing security concerns at U.S. institutions of higher learning, including the nation's 1,173 community colleges. Researchers say the goal of the report, "Campus Attacks:…
Department of Defense Information Enterprise: Strategic Plan 2010-2012
2010-04-01
migrate from circuit-based technology to a converged (voice, video , and data) IP network and UC services environment. Ensure the optimal...Kevin Coleman, “Cyber Attacks on Supply Chain Systems,” Defense Tech, April 15, 2009 8 Lolita C. Baldor, “Federal Web Sites Knocked Out by Cyber Attack
Inferring Internet Denial-of-Service Activity
2001-01-01
observe more than 12,000 attacks against more than 5,000 distinct targets, ranging from well known e- commerce companies such as Amazon and Hotmail to...observe more than 2,000 attacks against more than 5,000 distinct targets, ranging from well known e-commerce companies such as Amazon and Hotmail to small
Identifying and tracking attacks on networks: C3I displays and related technologies
NASA Astrophysics Data System (ADS)
Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.
2003-09-01
Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
Sung, Sharon C; Rush, A John; Earnest, Arul; Lim, Leslie E C; Pek, Maeve P P; Choi, Joen M F; Ng, Magdalene P K; Ong, Marcus E H
2018-01-01
Patients with panic-related anxiety often initially present to the emergency department (ED) complaining of respiratory or cardiac symptoms, but rates of detection of panic symptoms by ED physicians remain low. This study was undertaken to evaluate the relevance of panic attacks and panic disorder in ED patients who present with cardiopulmonary symptoms and to determine whether a brief symptom-based tool could be constructed to assist in rapid recognition of panic-related anxiety in the ED setting. English-speaking adult ED patients with a chief complaint of palpitations, chest pain, dizziness, or difficulty breathing were evaluated for the presence of panic attacks and panic disorder with the Structured Clinical Interview for DSM-IV Axis I Disorders. Participants completed self-report measures to assess panic-related symptoms, comorbid psychiatric conditions, health-related disability, and health service use. In this sample (N=200), 23.5% had panic attacks and 23.0% had panic disorder. Both groups reported higher rates of panic attack symptoms, greater psychiatric comorbidity, greater health-related disability, and higher rates of ED and mental health service use compared with those without either condition. A brief 7-item tool consisting of panic symptoms identified patients with panic attacks or panic disorder with 85% accuracy (area under the curve=0.90, sensitivity=82%, specificity=88%). Patients with panic attacks or panic disorder commonly present to the ED, but often go unrecognized. A brief 7-item clinician rating scale accurately identifies these patients among those ED patients presenting with cardiopulmonary complaints.
Secure data exchange between intelligent devices and computing centers
NASA Astrophysics Data System (ADS)
Naqvi, Syed; Riguidel, Michel
2005-03-01
The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.
Shi, Yang; Fan, Hongfei; Xiong, Guoyue
2015-01-01
With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.
Pandemic influenza-implications for critical care resources in Australia and New Zealand.
Anderson, Therese A; Hart, Graeme K; Kainer, Marion A
2003-09-01
To quantify resource requirements (additional beds and ventilator capacity), for critical care services in the event of pandemic influenza. Cross-sectional survey about existing and potential critical care resources. Participants comprised 156 of the 176 Australasian (Australia and New Zealand) critical care units on the database of the Australian and New Zealand Intensive Care Society (ANZICS) Research Centre for Critical Care Resources. The Meltzer, Cox and Fukuda model was adapted to map a range of influenza attack rate estimates for hospitalisation and episodes likely to require intensive care and to predict critical care admission rates and bed day requirements. Estimations of ventilation rates were based on those for community-acquired pneumonia. The estimated extra number of persons requiring hospitalisation ranged from 8,455 (10% attack rate) to 150,087 (45% attack rate). The estimated number of additional admissions to critical care units ranged from 423 (5% admission rate, 10% attack rate) to 37,522 (25% admission rate, 45% attack rate). The potential number of required intensive care bed days ranged from 846 bed days (2 day length of stay, 10% attack rate) to 375,220 bed days (10 day length of stay, 45% attack rate). The number of persons likely to require mechanical ventilation ranged from 106 (25% of projected critical care admissions, 10% attack rate) to 28,142 (75% of projected critical care admissions, 45% attack rate). An additional 1,195 emergency ventilator beds were identified in public sector and 248 in private sector hospitals. Cancellation of elective surgery could release a potential 76,402 intensive care bed days (per annum), but in the event of pandemic influenza, 31,150 bed days could be required over an 8- to 12-week period. Australasian critical care services would be overwhelmed in the event of pandemic influenza. More work is required in relation to modelling, contingency plans, and resource allocation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bentz, B.J.; Powell, J.A.; Logan, J.A.
1996-12-01
Colonization of a host tree by the mountain pine beetle (Dendroctonus ponderosae) involves chemical communication that enables a massive aggregation of beetles on a single resource, thereby ensuring host death and subsequent beetle population survival. Beetle populations have evolved a mechanism for termination of colonization on a lodgepole pine tree at optimal beetle densities, with a concomitant switch of attacks to nearby trees. Observations of the daily spatial and temporal attack process of mountain pine beetles (nonepidemic) attacking lodgepole pine suggest that beetles switch attacks to a new host tree before the original focus tree is fully colonized, and thatmore » verbenone, an antiaggregating pheromone, may be acting within a tree rather than between trees.« less
An improved biometrics-based authentication scheme for telecare medical information systems.
Guo, Dianli; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping
2015-03-01
Telecare medical information system (TMIS) offers healthcare delivery services and patients can acquire their desired medical services conveniently through public networks. The protection of patients' privacy and data confidentiality are significant. Very recently, Mishra et al. proposed a biometrics-based authentication scheme for telecare medical information system. Their scheme can protect user privacy and is believed to resist a range of network attacks. In this paper, we analyze Mishra et al.'s scheme and identify that their scheme is insecure to against known session key attack and impersonation attack. Thereby, we present a modified biometrics-based authentication scheme for TMIS to eliminate the aforementioned faults. Besides, we demonstrate the completeness of the proposed scheme through BAN-logic. Compared to the related schemes, our protocol can provide stronger security and it is more practical.
Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav
2014-10-01
Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
Message Integrity Model for Wireless Sensor Networks
ERIC Educational Resources Information Center
Qleibo, Haider W.
2009-01-01
WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…
Which skills and factors better predict winning and losing in high-level men's volleyball?
Peña, Javier; Rodríguez-Guerra, Jorge; Buscà, Bernat; Serra, Núria
2013-09-01
The aim of this study was to determine which skills and factors better predicted the outcomes of regular season volleyball matches in the Spanish "Superliga" and were significant for obtaining positive results in the game. The study sample consisted of 125 matches played during the 2010-11 Spanish men's first division volleyball championship. Matches were played by 12 teams composed of 148 players from 17 different nations from October 2010 to March 2011. The variables analyzed were the result of the game, team category, home/away court factors, points obtained in the break point phase, number of service errors, number of service aces, number of reception errors, percentage of positive receptions, percentage of perfect receptions, reception efficiency, number of attack errors, number of blocked attacks, attack points, percentage of attack points, attack efficiency, and number of blocks performed by both teams participating in the match. The results showed that the variables of team category, points obtained in the break point phase, number of reception errors, and number of blocked attacks by the opponent were significant predictors of winning or losing the matches. Odds ratios indicated that the odds of winning a volleyball match were 6.7 times greater for the teams belonging to higher rankings and that every additional point in Complex II increased the odds of winning a match by 1.5 times. Every reception and blocked ball error decreased the possibility of winning by 0.6 and 0.7 times, respectively.
Workplace response of companies exposed to the 9/11 World Trade Center attack: a focus-group study.
North, Carol S; Pfefferbaum, Betty; Hong, Barry A; Gordon, Mollie R; Kim, You-Seung; Lind, Lisa; Pollio, David E
2013-01-01
The terrorist attacks of 11 September 2001 (9/11) left workplaces in pressing need of a mental health response capability. Unaddressed emotional sequelae may be devastating to the productivity and economic stability of a company's workforce. In the second year after the attacks, 85 employees of five highly affected agencies participated in 12 focus groups to discuss workplace mental health issues. Managers felt ill prepared to manage the magnitude and the intensity of employees' emotional responses. Rapid return to work, provision of workplace mental health services, and peer support were viewed as contributory to emotional recovery. Formal mental health services provided were perceived as insufficient. Drawing on their post-9/11 workplace experience, members of these groups identified practical measures that they found helpful in promoting healing outside of professional mental health services. These measures, consistent with many principles of psychological first aid, may be applied by workplace leaders who are not mental health professionals. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
[Aggression faced by doctors during social service in Mexico].
Arredondo Trujillo, Francisco; Gascón Santos, Santiago; Espino Álvarez, Luis Arturo; Torres Morquecho, Maricela
2014-12-01
Physicians during their work activities have been exposed to suffering physical and non-physical aggression (insults, threats, sexual assaults and even murder) by patients. The frequency of such attacks has increased in recent years. The aim of this study is to identify the risk of attacks on physicians associated with the type of work place that health institutions have assigned them for their year of social service in Mexico. A cross-sectional questionnaire survey was conducted during 2012 of 371 physicians who were assigned to work in various community health centers called type "A", "B" or "C". Having worked in a work place type "C" was associated with physical aggression (OR: 2.32; 95% CI: 1.03-5.37), threats (OR: 2.64; 95% CI: 1.43-4.93), and insults (OR: 2.28; 95% CI: 1.35-3.88). The results should be interpreted with caution, but they suggest that physicians who are assigned to work in the places type "C" (where they must care for patients in a solitary manner and at night) during the year of social service in Mexico have a significant risk of being attacked.
On effectiveness of network sensor-based defense framework
NASA Astrophysics Data System (ADS)
Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh
2012-06-01
Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.
Optimal Resource Allocation in Electrical Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yao, Y; Edmunds, T; Papageorgiou, D
2004-01-15
Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less
Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress
2011-04-21
Procurement Congressional Research Service 4 Figure 1. Virginia-Class Attack Submarine Source: U.S. Navy file photo accessed by CRS on January...May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends Cutting Submarine Fleet,” NavyTimes.com, May 13, 2004. 44 U.S. Department of the Navy, An
Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress
2011-04-12
Research Service 4 Figure 1. Virginia-Class Attack Submarine Source: U.S. Navy file photo accessed by CRS on January 11, 2011, at http...September 2001, p. 23. 42 Bryan Bender, “Navy Eyes Cutting Submarine Force,” Boston Globe, May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends
Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems
ERIC Educational Resources Information Center
Rangan, Prahalad
2010-01-01
The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…
Cyberspace Superiority: Dominating the Digital Frontier
2014-01-01
2009/07/137_48261.html. 9 Lolita Baldor, “White House among targets of cyber attack: Other targets included NSA, Homeland Security and State...attackers appeared not to get the results for 10 Lolita Baldor, "White House among targets of cyber...Communications Commission (KCC) order service providers to deny access to 30,000 13 Lolita Baldor, "US
Security Attacks and Solutions in Electronic Health (E-health) Systems.
Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair
2016-12-01
For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.
Terrorism in Spain: emergency medical aspects.
García-Castrillo Riesgo, Luis; García Merino, Antonio
2003-01-01
A terrorism movement has been active in Spain during the last 20 years, with a painful number of victims. Civil Defense is in charge of the coordination of all the structures that are implicated in a terrorist incident. There are three typical patterns of attacks: (1) individual attacks; (2) group attacks; and (3) mass attacks. The individual attacks are done with guns, usually 9 mm, fired from a short distance; victims die from serious intracranial damage. Collective attacks are done using explosives under vehicles, tramp bombs, or "bomb vehicles;" victims are of different severity with wounds, burns, and blast injuries. With mass attacks with "bomb vehicles" in buildings or crowded public places, the numbers of victims are elevated and produce brutal social consequences. Emergency Medical Services integrated in to "Civil Defense" try to minimize the damage by initializing treatment on-scene and with the rapid provision of definitive care. During the last year, post-traumatic stress disorder treatment groups have been providing care to the victims and personnel. Chemical or biological weapons have not been used, although this is a great concern to the authorities.
A decision framework for managing risk to airports from terrorist attack.
Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R
2015-02-01
This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period. © 2014 Society for Risk Analysis.
Zhang, Liping; Zhu, Shaohui
2015-05-01
To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.
DCT-based cyber defense techniques
NASA Astrophysics Data System (ADS)
Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer
2015-09-01
With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.
Izabel dos Santos and the training of the health workers.
Paiva, Carlos Henrique Assunção
2015-06-01
This article discusses the career of Izabel dos Santos (1927-2010) as a means of examining the connections between health schools and agendas in contemporary Brazil. The article highlights dos Santos's training and her work in the Serviço Especial de Saúde Pública (SESP- Special Public Health Service), the Pan American Health Organization (PAHO) and in the formulation and implementation of national training programs for human resources within the area of health from the late 1970s onwards. The article highlights dos Santos's central role in the formulation and implementation of training policies for health workers, especially nursing technicians and assistants, and demonstrates how she occupies an important place in the history of Brazilian public health.
Risko, Casey B.; Rayes, Diana; Albaik, Ahmad; Alnajar, Mohammed; Kewara, Mazen; Baker, Elise; Rubenstein, Leonard S.
2018-01-01
Background Violent attacks on and interferences with hospitals, ambulances, health workers, and patients during conflict destroy vital health services during a time when they are most needed and undermine the long-term capacity of the health system. In Syria, such attacks have been frequent and intense and represent grave violations of the Geneva Conventions, but the number reported has varied considerably. A systematic mechanism to document these attacks could assist in designing more protection strategies and play a critical role in influencing policy, promoting justice, and addressing the health needs of the population. Methods and findings We developed a mobile data collection questionnaire to collect data on incidents of attacks on healthcare directly from the field. Data collectors from the Syrian American Medical Society (SAMS), using the tool or a text messaging system, recorded information on incidents across four of Syria’s northern governorates (Aleppo, Idleb, Hama, and Homs) from January 1, 2016, to December 31, 2016. SAMS recorded a total of 200 attacks on healthcare in 2016, 102 of them using the mobile data collection tool. Direct attacks on health facilities comprised the majority of attacks recorded (88.0%; n = 176). One hundred and twelve healthcare staff and 185 patients were killed in these incidents. Thirty-five percent of the facilities were attacked more than once over the data collection period; hospitals were significantly more likely to be attacked more than once compared to clinics and other types of healthcare facilities. Aerial bombs were used in the overwhelming majority of cases (91.5%). We also compared the SAMS data to a separate database developed by Physicians for Human Rights (PHR) based on media reports and matched the incidents to compare the results from the two methods (this analysis was limited to incidents at health facilities). Among 90 relevant incidents verified by PHR and 177 by SAMS, there were 60 that could be matched to each other, highlighting the differences in results from the two methods. This study is limited by the complexities of data collection in a conflict setting, only partial use of the standardized reporting tool, and the fact that limited accessibility of some health facilities and workers and may be biased towards the reporting of attacks on larger or more visible health facilities. Conclusions The use of field data collectors and use of consistent definitions can play an important role in the tracking incidents of attacks on health services. A mobile systematic data collection tool can complement other methods for tracking incidents of attacks on healthcare and ensure the collection of detailed information about each attack that may assist in better advocacy, programs, and accountability but can be practically challenging. Comparing attacks between SAMS and PHR suggests that there may have been significantly more attacks than previously captured by any one methodology. This scale of attacks suggests that targeting of healthcare in Syria is systematic and highlights the failure of condemnation by the international community and medical groups working in Syria of such attacks to stop them. PMID:29689085
Park, Hyoung Keun; Bae, Sang Rak; Kim, Satbyul E; Choi, Woo Suk; Paick, Sung Hyun; Ho, Kim; Kim, Hyeong Gon; Lho, Yong Soo
2015-02-01
The aim of this study was to evaluate the effect of seasonal variation and climate parameters on urinary tract stone attack and investigate whether stone attack is increased sharply at a specific point. Nationwide data of total urinary tract stone attack numbers per month between January 2006 and December 2010 were obtained from the Korean Health Insurance Review and Assessment Service. The effects of climatic factors on monthly urinary stone attack were assessed using auto-regressive integrated moving average (ARIMA) regression method. A total of 1,702,913 stone attack cases were identified. Mean monthly and monthly average daily urinary stone attack cases were 28,382 ± 2,760 and 933 ± 85, respectively. The stone attack showed seasonal trends of sharp incline in June, a peak plateau from July to September, and a sharp decline after September. The correlation analysis showed that ambient temperature (r = 0.557, p < 0.001) and relative humidity (r = 0.513, p < 0.001) were significantly associated with urinary stone attack cases. However, after adjustment for trends and seasonality, ambient temperature was the only climate factor associated with the stone attack cases in ARIMA regression test (p = 0.04). Threshold temperature was estimated as 18.4 °C. Risk of urinary stone attack significantly increases 1.71% (1.02-2.41 %, 95% confidence intervals) with a 1 °C increase of ambient temperature above the threshold point. In conclusion, monthly urinary stone attack cases were changed according to seasonal variation. Among the climates variables, only temperature had consistent association with stone attack and when the temperature is over 18.4 °C, urinary stone attack would be increased sharply.
Stewart, Tara L; Chipperfield, Judith G; Perry, Raymond P; Hamm, Jeremy M
2016-01-01
This study assessed the extent to which older adults attribute a recent heart attack/stroke to "old age," and examined consequences for subsequent lifestyle behavior and health-care service utilization. Community-dwelling adults (N = 57, ages 73-98 years) were interviewed about their heart attack/stroke, and an objective health registry provided data on health-care utilization over a 3-year period. Endorsement of "old age" as a cause of heart attack/stroke negatively predicted lifestyle behavior change, and positively predicted frequency of physician visits and likelihood of hospitalization over the subsequent 3 years. Findings suggest the importance of considering "old age" attributions in the context of cardiovascular health events. © The Author(s) 2014.
NASA Astrophysics Data System (ADS)
Keen, Arthur A.
2006-04-01
This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.
Deterring Malicious Behavior in Cyberspace
2015-01-01
Malicious Behavior in Cyberspace Strategic Studies Quarterly ♦ Spring 2015 [ 79 ] 8. Chris Pepper, ed., Defending against Denial of Service Attacks...Jackson Higgins , “Chinese Cyberespionage Tool Updated for Traditional Cyber- crime,” Dark Reading, 27 November 2012, http://www.darkreading.com/attacks...content /uploads/sites/43/vlpdfs/kaspersky-the-net-traveler-part1-final.pdf. 13. Kelly Jackson Higgins , “ ‘NetTraveler’ Cyberespionage Campaign
Latif, Rabia; Abbas, Haider; Assar, Saïd
2014-11-01
Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.
Neria, Yuval; Wickramaratne, Priya; Olfson, Mark; Gameroff, Marc J; Pilowsky, Daniel J; Lantigua, Rafael; Shea, Steven; Weissman, Myrna M
2013-02-01
The magnitude of the September 11, 2001 (9/11) attacks was without precedent in the United States, but long-term longitudinal research on its health consequences for primary care patients is limited. We assessed the prevalence and exposure-related determinants of mental disorders, functioning, general medical conditions, and service utilization, 1 and 4 years after the 9/11 attacks, in an urban primary care cohort (N = 444) in Manhattan. Although the prevalence of posttraumatic stress disorder (PTSD) and levels of functional impairment declined over time, a substantial increase in suicidal ideation and missed work was observed. Most medical outcomes and service utilization indicators demonstrated a short-term increase after the 9/11 attacks (mean change of +20.3%), followed by a minor decrease in the subsequent year (mean change of -3.2%). Loss of a close person was associated with the highest risk for poor mental health and functional status over time. These findings highlight the importance of longitudinal assessments of mental, functional, and medical outcomes in urban populations exposed to mass trauma and terrorism. Copyright © 2013 International Society for Traumatic Stress Studies.
Chemical terrorism for the intensivist.
Chalela, Julio A; Burnett, Thomas
2012-05-01
The use of chemical agents for terrorist attacks or military warfare is a major concern at the present time. Chemical agents can cause significant morbidity, are relatively inexpensive, and are easy to store and use. Weaponization of chemical agents is only limited by the physicochemical properties of some agents. Recent incidents involving toxic industrial chemicals and chemical terrorist attacks indicate that critical care services are frequently utilized. For obvious reasons, the critical care literature on chemical terrorism is scarce. This article reviews the clinical aspects of diagnosing and treating victims of chemical terrorism while emphasizing the critical care management. The intensivist needs to be familiar with the chemical agents that could be used in a terrorist attack. The military classification divides agents into lung agents, blood agents, vesicants, and nerve agents. Supportive critical care is the cornerstone of treatment for most casualties, and dramatic recovery can occur in many cases. Specific antidotes are available for some agents, but even without the antidote, aggressive intensive care support can lead to favorable outcome in many cases. Critical care and emergency services can be overwhelmed by a terrorist attack as many exposed but not ill will seek care.
Implications of the World Trade Center attack for the public health and health care infrastructures.
Klitzman, Susan; Freudenberg, Nicholas
2003-03-01
The September 11, 2001, attack on the World Trade Center had profound effects on the well-being of New York City. The authors describe and assess the strengths and weaknesses of the city's response to the public health, environmental/ occupational health, and mental health dimensions of the attack in the first 6 months after the event. They also examine the impact on the city's health care and social service system. The authors suggest lessons that can inform the development of a post-September 11th agenda for strengthening urban health infrastructures.
Implications of the World Trade Center Attack for the Public Health and Health Care Infrastructures
Klitzman, Susan; Freudenberg, Nicholas
2003-01-01
The September 11, 2001, attack on the World Trade Center had profound effects on the well-being of New York City. The authors describe and assess the strengths and weaknesses of the city’s response to the public health, environmental/ occupational health, and mental health dimensions of the attack in the first 6 months after the event. They also examine the impact on the city’s health care and social service system. The authors suggest lessons that can inform the development of a post–September 11th agenda for strengthening urban health infrastructures. PMID:12604481
Differentiated optical services: a quality of optical service model for WDM networks
NASA Astrophysics Data System (ADS)
Ndousse, Thomas D.; Golmie, Nada
1999-08-01
This paper addresses the issues of guaranteed and scalable end-to-end QoS in Metropolitan DWDM networks serving as transit networks for IP access networks. DWDM offering few wavelengths have in the past been deployed in backbone networks to upgrade point-to-point transmission where sharing is based on coarse granularity. This type of DWDM backbone networks, offering few lightpaths, provides no support for QoS services traversing the network. As DWDM networks with larger numbers of wavelengths penetrate the data-centric Metro environment, specific IP service requirements such as priority restoration, scalability, dynamic provisioning of capacity and routes, and support for coarse-grain QoS capabilities will have to be addressed in the optical domain in order to support end-to-end Service- Level Agreements. In this paper, we focus on the support of QoS in the optical domain in order to achieve end-to-end QoS over a DWDM network. We propose a QoS service model in the optical domain called Differentiated Optical Services (DOS). Service classification in DOS is based on a set of optical parameters that captures the quality and reliability of the optical lightpath.
2015-03-01
our focus will remain on Android rather than being all-inclusive of others such as iOS, Blackberry 10, and Windows Phone. The proof-of-concept...the attack surface for malicious applications to compromise vulnerable Services grows . Additionally, Services also have a life cycle with
Insecurity of Wireless Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less
Worldwide Threat Assessment of the US Intelligence Community
2014-01-29
data-deletion and system- damaging attacks. In early 2013, the US financial sector faced wide-scale network denial-of-service attacks that...South Sudan Nigeria Central African Republic Democratic Republic of the Congo Lord’s Resistance Army 19 19 19 19 19 20 20 21 21 East Asia...operations, financial activities, and personnel recruitment. Cyber criminal organizations are as ubiquitous as they are problematic on digital
Modeling the Effects of Cyber Operations on Kinetic Battles
2014-06-01
Nakashima, 2013). Equally dangerous are attacks targeting the national economy . In 2012, distributed denial of service (DDoS) attacks were carried out...enable our freedom of action in cyberspace. (USCYBERCOM Concept of Operations, v 1.0, 21 Sep 2010) Global Information Grid ( GIG ): The globally...managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing
Code of Federal Regulations, 2013 CFR
2013-01-01
... bright autumn day was darkened by the worst attack on the American people in our history. Thousands of innocent men, women, and children perished when mighty towers collapsed in the heart of New York City and... victims who perished as a result of the terrorist attacks of September 11, 2001. IN WITNESS WHEREOF, I...
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hodge, Brian S; Wu, Yifu; Wei, Jin
Distributed Energy Resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. As most of these generators are geographically dispersed, dedicated communications investments for every generator are capital cost prohibitive. Real-time distributed communications middleware, which supervises, organizes and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs, allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the Quality of Experience (QoE) measures to complement the conventional Quality of Service (QoS)more » information to detect and mitigate the congestion attacks effectively. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
A Distributed Middleware Architecture for Attack-Resilient Communications in Smart Grids: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Wei, Jin; Hodge, Bri-Mathias
Distributed energy resources (DERs) are being increasingly accepted as an excellent complement to traditional energy sources in smart grids. Because most of these generators are geographically dispersed, dedicated communications investments for every generator are capital-cost prohibitive. Real-time distributed communications middleware - which supervises, organizes, and schedules tremendous amounts of data traffic in smart grids with high penetrations of DERs - allows for the use of existing network infrastructure. In this paper, we propose a distributed attack-resilient middleware architecture that detects and mitigates the congestion attacks by exploiting the quality of experience measures to complement the conventional quality of service informationmore » to effectively detect and mitigate congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
Cryptography for a High-Assurance Web-Based Enterprise
2013-10-01
2. Other Cryptographic services - Java provides many cryptographic services through the Java Cryptography Architecture (JCA) framework. The...id=2125 [7]. Miller, Sandra Kay, Fiber Optic Networks Vulnerable to Attack, Information Security Magazine, November 15, 2006, [8]. José R.C
Protection against hostile algorithms in UNIX software
NASA Astrophysics Data System (ADS)
Radatti, Peter V.
1996-03-01
Protection against hostile algorithms contained in Unix software is a growing concern without easy answers. Traditional methods used against similar attacks in other operating system environments such as MS-DOS or Macintosh are insufficient in the more complex environment provided by Unix. Additionally, Unix provides a special and significant problem in this regard due to its open and heterogeneous nature. These problems are expected to become both more common and pronounced as 32 bit multiprocess network operating systems become popular. Therefore, the problems experienced today are a good indicator of the problems and the solutions that will be experienced in the future, no matter which operating system becomes predominate.
NASA Astrophysics Data System (ADS)
Feudo, Christopher V.
1994-04-01
This dissertation demonstrates that inadequately protected wireless LANs are more vulnerable to rogue program attack than traditional LANs. Wireless LANs not only run the same risks as traditional LANs, but they also run additional risks associated with an open transmission medium. Intruders can scan radio waves and, given enough time and resources, intercept, analyze, decipher, and reinsert data into the transmission medium. This dissertation describes the development and instantiation of an abstract model of the rogue code insertion process into a DOS-based wireless communications system using radio frequency (RF) atmospheric signal transmission. The model is general enough to be applied to widely used target environments such as UNIX, Macintosh, and DOS operating systems. The methodology and three modules, the prober, activator, and trigger modules, to generate rogue code and insert it into a wireless LAN were developed to illustrate the efficacy of the model. Also incorporated into the model are defense measures against remotely introduced rogue programs and a cost-benefit analysis that determined that such defenses for a specific environment were cost-justified.
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.
Alonso, Roberto; Monroy, Raúl; Trejo, Luis A
2016-08-17
The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers
Alonso, Roberto; Monroy, Raúl; Trejo, Luis A.
2016-01-01
The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169
Possick, Chaya; Shamai, Michal; Sadeh, Ruth Ann
2014-05-01
This study focuses on expressed needs and structures of assistance received by Israeli parents whose children were killed in terror attacks. The loss takes place within a multi-systemic network that can be a healing force and/or a distorting factor in the grief process. The qualitative research paradigm employed privileges the knowledge of the parents themselves. In-depth interviews were conducted with 16 parents. (1) The primary criterion that determines the parents' attribution of helpfulness is perceived inclusiveness. (2) The subsystem of "family of the bereaved" is salient in the healing process. (3) There is a clear preference for the services provided by NGO's as opposed to governmental agencies. (4) The bereaved parents engage the symbolic level of the macro-system-the heritage of the Jewish people. The article concludes with the practical implications of the findings for the development and delivery of psychosocial services to parents bereaved in terror attacks.
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330
Security analysis and improvement of an anonymous authentication scheme for roaming services.
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.
Evaluating School-Based Psychological and Counselling Services in Macao Using a Qualitative Approach
ERIC Educational Resources Information Center
van Schalkwyk, Gertina J.; Sit, Holly H. Y.
2013-01-01
The purpose of this study was to explore the status of psychological services in schools in Macao, and the role of school counsellors providing these services. At present, school psychology is not a recognized profession within the territory and school counsellors appointed by the Direccao dos Servicos de Educacao e Juventude (DSEJ) through their…
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1989-01-01
In November 1988 a worm program invaded several thousand UNIX-operated Sun workstations and VAX computers attached to the Research Internet, seriously disrupting service for several days but damaging no files. An analysis of the work's decompiled code revealed a battery of attacks by a knowledgeable insider, and demonstrated a number of security weaknesses. The attack occurred in an open network, and little can be inferred about the vulnerabilities of closed networks used for critical operations. The attack showed that passwork protection procedures need review and strengthening. It showed that sets of mutually trusting computers need to be carefully controlled. Sharp public reaction crystalized into a demand for user awareness and accountability in a networked world.
Solving Defender-Attacker-Defender Models for Infrastructure Defense
2011-01-01
PRA,” also 28 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to...information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports , 1215... REPORT DATE 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Solving Defender-Attacker-Defender Models for
Insider Threat Detection on the Windows Operating System using Virtual Machine Introspection
2012-06-14
by a malicious insider. HBSS systems running on a user’s workstation could be disabled either due to misconfiguration, privilege escalation , or by a...potential malicious insider threat, organizations must develop use cases which categorize possible attack techniques, such as data exfiltration via...hardware and contain any type of data an attacker may be looking for. Minimal Resources Since honeypots do not provide any network services, they
Policy-Aware Sender Anonymity in Location-Based Services
ERIC Educational Resources Information Center
Vyas, Avinash
2011-01-01
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Code of Federal Regulations, 2011 CFR
2011-01-01
... Proclamation There is no greater evil than willful violence against innocents. On this National Day of Service... of the Oklahoma City bombing, the September 11 attacks, and other incidents of violence around the... with appropriate ceremonies, activities, and acts of community service in memory of the victims and...
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316
DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.
Kim, Mihui; Chae, Kijoon
2010-01-01
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.
A secure biometrics-based authentication scheme for telecare medicine information systems.
Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng
2013-10-01
The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.
Arshad, Hamed; Nikooghadam, Morteza
2014-12-01
Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.
Information Assurance in Wireless Networks
NASA Astrophysics Data System (ADS)
Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David
2001-09-01
Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.
NASA Astrophysics Data System (ADS)
Parfenov, D. I.; Bolodurina, I. P.
2018-05-01
The article presents the results of developing an approach to detecting and protecting against network attacks on the corporate infrastructure deployed on the multi-cloud platform. The proposed approach is based on the combination of two technologies: a softwareconfigurable network and virtualization of network functions. The approach for searching for anomalous traffic is to use a hybrid neural network consisting of a self-organizing Kohonen network and a multilayer perceptron. The study of the work of the prototype of the system for detecting attacks, the method of forming a learning sample, and the course of experiments are described. The study showed that using the proposed approach makes it possible to increase the effectiveness of the obfuscation of various types of attacks and at the same time does not reduce the performance of the network
Metrics for Assessment of Smart Grid Data Integrity Attacks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annarita Giani; Miles McQueen; Russell Bent
2012-07-01
There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised datamore » by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.« less
Economic burden of gouty arthritis attacks for employees with frequent and infrequent attacks.
Lynch, Wendy; Chan, Wing; Kleinman, Nathan; Andrews, L M; Yadao, Anthony M
2013-04-01
The objective of this study was to compare episode-related and annual costs and work absence days for employees with <3 versus ≥ 3 annual gout attacks. Human Capital Management Services data (2009-2010) from adult employees with gout (International Classification of Diseases, Ninth Revision code 274.x) and ≥ 12 months of medical and pharmacy benefits were studied. Outcomes of interest included medical and drug costs, number of emergency department and urgent care visits, number of inpatient days, short- and long-term disability, sick leave, workers' compensation costs, and work absence days. An algorithm based on diagnosis code and antigout medication use identified acute gout treatment episodes. Multivariate analysis compared annual and pre-episode vs. during-episode outcomes for employees with ≥ 3 vs. <3 gout annual attacks. Of 3361 employees with gout, 76 had ≥ 3 attacks; these employees had higher short-term disability costs ($1663 vs. $643, P=0.06) and days (11.68 versus 4.61, P<0.05), more emergency room visits (0.55 vs. 0.23, P<0.0001), and urgent care visits (0.07 vs. 0.04, P<0.01), and lower pharmacy costs ($1677 vs. $1108, P<0.0001) than those with <3 attacks. Medical costs both before ($203 higher) and during attacks ($136 higher) were significantly higher for those with ≥ 3 attacks than for those with <3 attacks. Additionally, a quadratic increasing relationship was found between number of attacks and cost. Frequency of acute gout attacks (≥ 3 episodes per year) among employees with gout was associated with greater short-term disability cost, absence days, and emergency department and urgent care visits, and trends toward higher overall costs.
Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks
NASA Astrophysics Data System (ADS)
Hortos, William S.
2007-09-01
A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node and trust neighborhood, collecting parametric information and executing assigned decision tasks. The communications overhead due to security mechanisms and the latency in network response are thus minimized by reducing the need to move large amounts of audit data through resource-limited nodes and by locating detection/identification programs closer to audit data. If network partitioning occurs due to uncoordinated node exhaustion, data compromise or other effects of the attacks, the mobile agents can continue to operate, thereby increasing fault tolerance in the network response to intrusions. Since the mobile agents behave like an ant colony in securing the WSN, published ant colony optimization (ACO) routines and other evolutionary algorithms are adapted to protect network security, using data at and through nodes to create audit records to detect and respond to denial-of-service attacks. Performance evaluations of algorithms are performed by simulation of a few intrusion attacks, such as black hole, flooding, Sybil and others, to validate the ability of the cross-layer algorithms to enable WSNs to survive the attacks. Results are compared for the different algorithms.
Public knowledge of heart attack symptoms in Beijing residents.
Zhang, Qing-Tan; Hu, Da-Yi; Yang, Jin-Gang; Zhang, Shou-Yan; Zhang, Xin-Quan; Liu, Shu-Shan
2007-09-20
Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy, and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care. Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack. A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006. Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community. A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms. Public knowledge of common heart attack symptoms as well as less common heart attack symptoms is deficient in Beijing residents. But their knowledge of calling emergency medical services when someone is having a heart attack is relatively adequate. Public health efforts are needed to increase the recognition of the major heart attack symptoms in both the general public and groups at high risk for an acute cardiac event, especially in socioeconomically disadvantaged subgroups, including persons with low education level, low household income, and no health insurance coverage.
Security attack detection algorithm for electric power gis system based on mobile application
NASA Astrophysics Data System (ADS)
Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan
2017-05-01
Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.
48 CFR 637.104 - Personal services contracts.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Personal services contracts. 637.104 Section 637.104 Federal Acquisition Regulations System DEPARTMENT OF STATE SPECIAL.... The Office of the Legal Adviser is the DOS legal counsel for the purposes of FAR 37.104(e). ...
33 CFR 106.305 - Facility Security Assessment (FSA) requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
... available to maintain essential services; (vi) The essential maintenance equipment and storage areas; (vii... procedures relating to essential services; (v) Measures to protect radio and telecommunication equipment... property, or economic disruption, of an attack on or at the OCS facility; and (7) Locations where access...
Security Engineering FY17 Systems Aware Cybersecurity
2017-12-07
11 Figure 4 A hierarchical controls model that defines the expected service of a UAV. Each level is...defined by a generic control structure. Inadequate control in each level can cause an adversarial action to degrade the expected service and produce a...and can completely violate the systems expected service by escalating their privileges by either using the attack vectors presented individually or
BFT replication resistant to MAC attacks
NASA Astrophysics Data System (ADS)
Zbierski, Maciej
2016-09-01
Over the last decade numerous Byzantine fault-tolerant (BFT) replication protocols have been proposed in the literature. However, the vast majority of these solutions reuse the same authentication scheme, which makes them susceptible to a so called MAC attack. Such vulnerability enables malicious clients to undetectably prevent the replicated service from processing incoming client requests, and consequently making it permanently unavailable. While some BFT protocols attempted to address this issue by using different authentication mechanisms, they at the same time significantly degraded the performance achieved in correct environments. This article presents a novel adaptive authentication mechanism which can be combined with practically any Byzantine fault-tolerant replication protocol. Unlike previous solutions, the proposed scheme dynamically switches between two operation modes to combine high performance in correct environments and liveness during MAC attacks. The experiment results presented in the article demonstrate that the proposed mechanism can sufficiently tolerate MAC attacks without introducing any observable overhead whenever no faults are present.
Termiticides - the Gulfport report
Bradford M. Kard
1999-01-01
Termiticide treatments to soil are the most widely used and successful method to protect wooden structures from attack by subterranean termites and potentially new termiticides continue to be placed in Forest Service field tests each year. This article presents the latest findings taken from USDA Forest Service field tests in Arizona, Florida, Mississippi, and South...
School Psychology Services: Community-Based, First-Order Crisis Intervention during the Gulf War.
ERIC Educational Resources Information Center
Klingman, Avigdor
1992-01-01
Examines the community-based mental health preventive measures undertaken by the school psychology services in response to the missile attacks on Israel during the Gulf War. Attempts to report and delineate the major assumptions and components of some of the key interventions. (Author/NB)
Liu, Zhiquan; Ma, Jianfeng; Jiang, Zhongyuan; Miao, Yinbin; Gao, Cong
2016-01-01
With the prevalence of Social Networks (SNs) and services, plenty of trust models for Trustworthy Service Recommendation (TSR) in Service-oriented SNs (S-SNs) have been proposed. The reputation-based schemes usually do not contain user preferences and are vulnerable to unfair rating attacks. Meanwhile, the local trust-based schemes generally have low reliability or even fail to work when the trust path is too long or does not exist. Thus it is beneficial to integrate them for TSR in S-SNs. This work improves the state-of-the-art Combining Global and Local Trust (CGLT) scheme and proposes a novel Integrating Reputation and Local Trust (IRLT) model which mainly includes four modules, namely Service Recommendation Interface (SRI) module, Local Trust-based Trust Evaluation (LTTE) module, Reputation-based Trust Evaluation (RTE) module and Aggregation Trust Evaluation (ATE) module. Besides, a synthetic S-SN based on the famous Advogato dataset is deployed and the well-known Discount Cumulative Gain (DCG) metric is employed to measure the service recommendation performance of our IRLT model with comparing to that of the excellent CGLT model. The results illustrate that our IRLT model is slightly superior to the CGLT model in honest environment and significantly outperforms the CGLT model in terms of the robustness against unfair rating attacks. PMID:26963089
Liu, Zhiquan; Ma, Jianfeng; Jiang, Zhongyuan; Miao, Yinbin; Gao, Cong
2016-01-01
With the prevalence of Social Networks (SNs) and services, plenty of trust models for Trustworthy Service Recommendation (TSR) in Service-oriented SNs (S-SNs) have been proposed. The reputation-based schemes usually do not contain user preferences and are vulnerable to unfair rating attacks. Meanwhile, the local trust-based schemes generally have low reliability or even fail to work when the trust path is too long or does not exist. Thus it is beneficial to integrate them for TSR in S-SNs. This work improves the state-of-the-art Combining Global and Local Trust (CGLT) scheme and proposes a novel Integrating Reputation and Local Trust (IRLT) model which mainly includes four modules, namely Service Recommendation Interface (SRI) module, Local Trust-based Trust Evaluation (LTTE) module, Reputation-based Trust Evaluation (RTE) module and Aggregation Trust Evaluation (ATE) module. Besides, a synthetic S-SN based on the famous Advogato dataset is deployed and the well-known Discount Cumulative Gain (DCG) metric is employed to measure the service recommendation performance of our IRLT model with comparing to that of the excellent CGLT model. The results illustrate that our IRLT model is slightly superior to the CGLT model in honest environment and significantly outperforms the CGLT model in terms of the robustness against unfair rating attacks.
Leadership in Crisis: Service Chiefs in the Post-Vietnam World
2012-06-01
the Korean War offered numerous lessons for the Army and USAF based on the effectiveness of interdiction and the need to coordinate with the ground ...roles and missions.100 Attack capability in this discussion is a platform’s ability to attack targets on the ground . Both USAF and Army leaders had...States Government; Record Group 11; National Archives , 7 August 1964). AU/SAASS/MILLS/AY12 72 of war.8 Soon after Johnson signed the resolution
2015-06-01
headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and...are positioned on the outer ASW screen to protect an HVU from submarine attacks. This baseline scenario provides a standardized benchmark on current...are positioned on the outer ASW screen to protect an HVU from submarine attacks. This baseline scenario provides us a standardized benchmark . In the
Health services utilization under Qassam rocket attacks.
Goldberg, Lital; Dreiher, Jacob; Friger, Michael; Levin, Alexander; Shvartzman, Pesach
2013-08-01
The Qassam rocket attacks on southern Israel during the years 2000-2007 created a unique situation of life undera continuous threat. The effect of this unique situation on health services utilization has not been previously examined. To evaluate health utilization patterns in two primary care clinics in southern Israel: one under continuous attacks of Qassam rockets as compared with a similar clinic not under a rocket threat. We conducted a retrospective cross-sectional study in two primary care clinics in southern Israel, with 11,630 persons listed in the two clinics during the entire study period. The primary outcome measures were total annual number of visits per person to the clinic and for specific diagnoses, and the number of drug prescriptions issued, emergency room (ER) visits, hospitalization days, cardiac catheterizations and coronary bypass surgeries. In both clinics there was an increase over time in the mean annual number of visits per person. During the years of severe attacks there was an increase in visits with a chief complaint of depression and anxiety and an increase in the number of anxiolytic prescriptions in the study clinic compared with the control. During the same period there was a decrease in the number of ER visits in the study clinic compared with the control. The population under continuous life-threatening events showed more depression and anxiety problems. Under severe bombardment, the residents prefer not to leave home, unless necessary.
Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru
2016-10-01
Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security verification of our scheme using the widely accepted AVISPA tool. High security and extra functionality features allow our proposed scheme to be applicable for telecare medicine information systems which is used for e-health care medical applications. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Rabadan, Jose; Perez-Jimenez, Rafael
2017-01-01
Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks. PMID:29186184
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
Marin-Garcia, Ignacio; Chavez-Burbano, Patricia; Guerra, Victor; Rabadan, Jose; Perez-Jimenez, Rafael
2017-01-01
Visible Light Communications (VLC) is a cutting edge technology for data communication that is being considered to be implemented in a wide range of applications such as Inter-vehicle communication or Local Area Network (LAN) communication. As a novel technology, some aspects of the implementation of VLC have not been deeply considered or tested. Among these aspects, security and its implementation may become an obstacle for VLCs broad usage. In this article, we have used the well-known Risk Matrix methodology to determine the relative risk that several common attacks have in a VLC network. Four examples: a War Driving, a Queensland alike Denial of Service, a Preshared Key Cracking, and an Evil Twin attack, illustrate the utilization of the methodology over a VLC implementation. The used attacks also covered the different areas delimited by the attack taxonomy used in this work. By defining and determining which attacks present a greater risk, the results of this work provide a lead into which areas should be invested to increase the safety of VLC networks.
Roberson-Nay, Roxann; Berenz, Erin C.; Acierno, Ron; Tran, Trinh Luong; Trung, Lam Tu; Tam, Nguyen Thanh; Tuan, Tran; Buoi, La Thi; Ha, Tran Thu; Thach, Tran Duc; Amstadter, Ananda B.
2013-01-01
The association between trauma exposure and panic attacks has received increased attention over the past decade, with mounting evidence suggesting an overlapping etiologic pathway. This study examined the incidence of new onset panic attacks in 775 Vietnamese individuals in the 2–3 months following Typhoon Xangsane. Pre-typhoon (Wave 1) and post-typhoon (Wave 2) assessments were conducted, allowing for consideration of factors occurring prior to the typhoon in addition to typhoon-relevant responding. Of the 775 participants, 11.6% (n=90) met criteria for lifetime panic attack pre-typhoon and 2.8% (n=22) met post-typhoon panic attack criteria. Individuals with pre-typhoon panic were significantly older and reported less education compared to the no-panic group. Individuals in both panic groups were more likely to screen positive on a Wave1 psychiatric screening measure, endorse greater typhoon exposure and prior traumatic event exposure and were significantly more likely to meet DSM-IV criteria for posttraumatic stress disorder (PTSD) and major depression (MDD) post-typhoon compared with persons reporting no history of panic attacks. Pre and post-typhoon panic exhibited similar patterns across variables and both panic conditions were associated with the development of PTSD and MDD, suggesting that persons experiencing panic attacks may represent a vulnerable population in need of early intervention services. PMID:23778303
Receipt of outpatient cardiac rehabilitation among heart attack survivors--United States, 2005.
2008-02-01
Each year, approximately 865,000 persons in the United States have a myocardial infarction (i.e., heart attack). In 2007, direct and indirect costs of heart disease were estimated at approximately $277.1 billion. Cardiac rehabilitation, an essential component of recovery care after a heart attack, focuses on cardiovascular risk reduction, promoting healthy behaviors, reducing death and disability, and promoting an active lifestyle for heart attack survivors. Current guidelines from the American Heart Association (AHA) and the American Association of Cardiovascular and Pulmonary Rehabilitation emphasize the importance of cardiac rehabilitation, which reduces morbidity and mortality, improves clinical outcomes, enhances psychological recovery, and decreases the risk for secondary cardiac events. To estimate the prevalence of receipt of outpatient cardiac rehabilitation among heart attack survivors in 21 states and the District of Columbia (DC), data from the 2005 Behavioral Risk Factor Surveillance System (BRFSS) were assessed. The results of that assessment indicated that 34.7% of BRFSS respondents who had experienced a heart attack participated in outpatient cardiac rehabilitation. Outpatient cardiac rehabilitation for eligible patients after a heart attack is an essential component of care that should be incorporated into treatment plans. Increasing the number of persons who participate in cardiac rehabilitation services also can reduce health-care costs for recurrent events and reduce the burden on families and caregivers of patients with serious sequelae.
Verger, Pierre; Dab, William; Lamping, Donna L; Loze, Jean-Yves; Deschaseaux-Voinet, Céline; Abenhaim, Lucien; Rouillon, Frédéric
2004-08-01
A wave of bombings struck France in 1995 and 1996, killing 12 people and injuring more than 200. The authors conducted follow-up evaluations with the victims in 1998 to determine the prevalence of and factors associated with posttraumatic stress disorder (PTSD). Victims directly exposed to the bombings (N=228) were recruited into a retrospective, cross-sectional study. Computer-assisted telephone interviews were conducted to evaluate PTSD, per DSM-IV criteria, and to assess health status before the attack, initial injury severity and perceived threat at the time of attack, and psychological symptoms, cosmetic impairment, hearing problems, and health service use at the time of the follow-up evaluation. Factors associated with PTSD were investigated with univariate logistic regression followed by multiple logistic regression analyses. A total of 196 respondents (86%) participated in the study. Of these, 19% had severe initial physical injuries (hospitalization exceeding 1 week). Problems reported at the follow-up evaluation included attack-related hearing problems (51%), cosmetic impairment (33%), and PTSD (31%) (95% confidence interval=24.5%-37.5%). Results of logistic regression analyses indicated that the risk of PTSD was significantly higher among women (odds ratio=2.54), participants age 35-54 (odds ratio=2.83), and those who had severe initial injuries (odds ratio=2.79) or cosmetic impairment (odds ratio=2.74) or who perceived substantial threat during the attack (odds ratio=3.99). The high prevalence of PTSD 2.6 years on average after a terrorist attack emphasizes the need for improved health services to address the intermediate and long-term consequences of terrorism.
Fagan, Joanne; Galea, Sandro; Ahern, Jennifer; Bonner, Sebastian; Vlahov, David
2003-01-01
Posttraumatic psychological stress may be associated with increases in somatic illness, including asthma, but the impact of the psychological sequelae of the September 11, 2001 terrorist attacks on physical illness has not been well documented. The authors assessed the relationship between the psychological sequelae of the attacks and asthma symptom severity and the utilization of urgent health care services for asthma since September 11. The authors performed a random digit dial telephone survey of adults in the New York City (NYC) metropolitan area 6 to 9 months after September 11, 2001. Two thousand seven hundred fifty-five demographically representative adults including 364 asthmatics were recruited. The authors assessed self-reported asthma symptom severity, emergency room (ER) visits, and unscheduled physician office visits for asthma since September 11. After adjustment for asthma measures before September 11, demographics, and event exposure in multivariate models posttraumatic stress disorder (PTSD) were a significant predictor of self-reported moderate-to-severe asthma symptoms (OR = 3.4; CI = 1.2-9.4), seeking care for asthma at an ER since September 11 (OR = 6.6; CI = 1.6-28.0), and unscheduled physician visits for asthma since September 11 (OR = 3.6; CI = 1.1-11.5). The number of PTSD symptoms was also significantly related to moderate-to-severe asthma symptoms and unscheduled physician visits since September 11. Neither a panic attack on September 11 nor depression since September 11 was an independent predictor of asthma severity or utilization in multivariate models after September 11. PTSD related to the September 11 terrorist attacks contributed to symptom severity and the utilization of urgent health care services among asthmatics in the NYC metropolitan area.
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
Defending against Browser Based Data Exfiltration Attacks
ERIC Educational Resources Information Center
Sood, Aditya
2013-01-01
The global nature of Internet has revolutionized cultural and commercial interactions while at the same time it has provided opportunities for cyber criminals. Crimeware services now exist that have transformed the nature of cyber crime by making it more automated and robust. Furthermore, these crimeware services are sold as a part of a growing…
When Things Go Wrong: Managing Critical Incidents in Children's Services.
ERIC Educational Resources Information Center
Legg, Chris
2001-01-01
Critical incidents particular to an individual or family (such as parental divorce or death of a family member) and incidents of national or international significance (such as wars or terrorist attacks) effect those involved in children's services and can result in some children, families, or staff suffering long-term psychological effects. This…
Learning Management in a Crisis: A Service Learning Response to September 11, 2001
ERIC Educational Resources Information Center
Schaffer, R. Andrew
2004-01-01
This article describes a service learning project implemented midsemester in response to the September 11, 2001, attacks. The project applied course topics while allowing students to positively channel their anxiety. Students developed and implemented a community-wide effort to collect care packages for U.S. troops deployed to Afghanistan. The…
Trape, Sébastien
2008-01-30
The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828-2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947-2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3-15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%), including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand fold lower.
Trape, Sébastien
2008-01-01
Background The International Shark Attack File mentions only four unprovoked shark attacks on the coast of West Africa during the period 1828–2004, an area where high concentrations of sharks and 17 species potentially dangerous to man have been observed. To investigate if the frequency of shark attacks could be really low and not just under-reported and whether there are potentially sharks that might attack in the area, a study was carried out in Dakar and the Cap Vert peninsula, Senegal. Methodology/Principal Findings Personnel of health facilities, administrative services, traditional authorities and groups of fishermen from the region of Dakar were interviewed about the occurrence of shark attacks, and visual censuses were conducted along the coastline to investigate shark communities associated with the coasts of Dakar and the Cap Vert peninsula. Six attacks were documented for the period 1947–2005, including two fatal ones attributed to the tiger shark Galeocerdo cuvieri. All attacks concerned fishermen and only one occurred after 1970. Sharks were observed year round along the coastline in waters 3–15 m depth. Two species potentially dangerous for man, the nurse shark Ginglymostoma cirratum and the blacktip shark Carcharhinus limbatus, represented together 94% of 1,071 sharks enumerated during 1,459 hours of observations. Threatening behaviour from sharks was noted in 12 encounters (1.1%), including 8 encounters with C. limbatus, one with Galeocerdo cuvieri and 3 with unidentified sharks. Conclusions/Significance These findings suggest that the frequency of shark attacks on the coast of West Africa is underestimated. However, they also indicate that the risk is very low despite the abundance of sharks. In Dakar area, most encounters along the coastline with potentially dangerous species do not result in an attack. Compared to other causes of water related deaths, the incidence of shark attack appears negligible, at least one thousand fold lower. PMID:18231582
A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
NASA Astrophysics Data System (ADS)
You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki
Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, Kempf-Koodli's scheme is formally analyzed through BAN-logic and its weaknesses are demonstrated.
U.S. Marine Corps Operations in Iraq, 2003-2006
2009-01-01
Medina . The initial assignment for 11th MEU was the smoldering city of an-Najaf. After unloading from its shipping at Kuwait, Colonel Haslam sent...ron, 7th Cavalry) launch limited attacks to occupy the cemetery and the old city zone south of the Medina . The 1st Battalion, 4th Marines attacks in...Michael R. Ramos ) with attachments and most of MEU Service Support Group 31 of (commanded by Lieutenant Colonel James A. Vohr) reported on 24 October
Implementation and Analysis of a Threat Model for IPv6 Host Autoconfiguration
2006-09-01
Collision Generator”, two Denial of Service attacks. The software was developed in NetBeans IDE 5.0, and the comments were converted to Javadoc with the...appropriate NetBeans function. A. ICMPV6 SUPPORT FOR JPCAP As the attack uses ICMPv6 messages, a means must be provided to generate these messages...ICMP packet. * * Developed in NetBeans IDE 5.0 * Makes use of Jpcap 0.5.1 library * (http://netresearch.ics.uci.edu/kfujii/jpcap/doc
NASA Astrophysics Data System (ADS)
Yuan, Yuan; Sun, Fuchun; Liu, Huaping
2016-07-01
This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.
Information on and Comments Concerning Suicide Plane Attacks
1945-06-25
8217 TBE ALERT FOR’ SU. ; ATTACKS AT ALL .TIMWES %. EN EIEM!Y AIR ATTACK I-S 1REA0ASLY POSJ SIL Aw ?) MUST tNOT BE DISTRACTED FRi OWN S3ETOR OF RESPON1L...A:UTF-LD TO A D :INfl E.:I.ATE F: IR ING Ok iWt; AI PCRAFT BY EN T. iA’l Y TI:’CER F!-NGE~. X OH:E’ER: PLME ’OT FOLLOWI O - ,APPPOA-, PR CE.RE...COMMUNICATION SERVICE l C.SIFICATION AMPHIBIOUS FORCES, PACIFIC PRECEDENC ’ 8"A8iS ’,F’’ IT’i.GN, aNiR ATON8 O F PERSONN EL , AND) EXAMIATiON OF:Xeti~ss
Naval Open Architecture Machinery Control Systems for Next Generation Integrated Power Systems
2012-05-01
PORTABLE) OS / RTOS ADAPTATION MIDDLEWARE (FOR OS PORTABILITY) MACHINERY CONTROLLER FRAMEWORK MACHINERY CONTROL SYSTEM SERVICES POWER CONTROL SYSTEM...SERVICES SHIP SYSTEM SERVICES TTY 0 TTY N … OPERATING SYSTEM ( OS / RTOS ) COMPUTER HARDWARE UDP IP TCP RAW DEV 0 DEV N … POWER MANAGEMENT CONTROLLER...operating systems (DOS, Windows, Linux, OS /2, QNX, SCO Unix ...) COMPUTERS: ISA compatible motherboards, workstations and portables (Compaq, Dell
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong
2015-11-01
The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.
Evaluation of workforce and organizational issues in establishing primary angioplasty in England.
Carter, Angela; Wood, Stephen; Goodacre, Steve; Sampson, Fiona; Stables, Rod
2010-01-01
To assess workforce and organizational issues in establishing a primary angioplasty service in England. Staff associated with the heart attack pathway at seven acute hospitals participating in the National Infarct Angioplasty Project (NIAP) completed a questionnaire, participated in focus groups and interviews, and observations were undertaken in catheter laboratories. All seven hospitals implemented primary angioplasty though not all provided a 24-hour service. Hospitals varied in size, number of staff involved in the delivery of angioplasty and the volume of cases. Hospitals that developed the service by incremental expansion encountered more problems than hospitals that planned for a full service at the outset. Simple, direct access to a catheter laboratory reduced delays and could be facilitated by an angioplasty gatekeeper. Little attention was paid to later cardiac rehabilitation. Multiskilling and the ability to work across traditional professional boundaries appeared to provide substantial advantages. Building relationships with key staff and auditing the heart attack pathway were critical to successful service development. Differences in remuneration and rest for staff undertaking out-of-hours working threatened sustainability. Primary angioplasty was feasible in varied settings and generally supported by staff. However, the participating hospitals were selected enthusiasts, only some implemented a 24-hour service and activity levels were relatively low. Organizational and workforce issues need to be addressed to achieve an efficient and sustainable service.
Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M
2017-10-01
The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.
Jeerakathil, Thomas; Shuaib, Ashfaq; Majumdar, Sumit R; Demchuk, Andrew M; Butcher, Kenneth S; Watson, Tim J; Dean, Naeem; Gordon, Deb; Edmond, Cathy; Coutts, Shelagh B
2014-10-01
Stroke risk after transient ischaemic attack is high and, it is a challenge worldwide to provide urgent assessment and preventive services to entire populations. To determine whether a province-wide transient ischaemic attack Triaging algorithm and transient ischaemic attack hotline (the Alberta Stroke Prevention in transient ischaemic attacks and mild strokes intervention) can reduce the rate of stroke recurrence following transient ischaemic attack across the population of Alberta, Canada (population 3·7 million, 90-day rate of post-stroke transient ischaemic attack currently 9·5%). It also seeks to improve upon current transient ischaemic attack triaging rules by incorporating time from symptom onset as a predictive variable. The transient ischaemic attack algorithm and hotline were developed with a broad consensus of clinicians, patients, policy-makers, and researchers and based on local adaptation of the work of others and research and insights developed within the province. Because neither patient-level nor region-level randomization was possible, we conducted a quasi-experimental design examining changes in the post-transient ischaemic attack rate of stroke recurrence before and after the 15-month implementation period using an interrupted time-series regression analysis. The design controls for changes in case-mix, co-interventions, and secular trends. A prospective transient ischaemic attack cohort will also be concurrently created with telephone follow-up at seven-days and 90 days as well as passive follow-up over the longer term using linkages to provincial healthcare administrative databases. The primary outcome measure is the change in recurrence rate of stroke following transient ischaemic attack at seven-days and 90 days, comparing a period of two-years before vs. two-years after the intervention is implemented. All cases of recurrent stroke will be validated. Secondary outcomes include functional status, hospitalizations, morbidity, and mortality. We are undertaking a rigorous evaluation of a population-based approach to improving quality of transient ischaemic attack care. Whether positive or negative, our work should provide important insights for all potential stakeholders. © 2012 The Authors. International Journal of Stroke © 2012 World Stroke Organization.
... 22, 2012 | News Release NIH launches trial to evaluate anti-inflammatory treatment for preventing heart attacks, strokes, ... and Usage No FEAR Act Grants and Funding Customer Service/Center for Health Information Email Alerts Jobs ...
ERIC Educational Resources Information Center
Green, Jennifer Greif; Xuan, Ziming; Kwong, Lana; Holt, Melissa K.; Comer, Jonathan S.
2016-01-01
After mass crises, trauma-exposed children report increased psychological distress, yet most receive no mental health (MH) services and supports. This study identifies factors associated with teachers' reports of outreach to school-based MH providers (such as social workers, psychologists, and counselors) as well as provision of informal supports…
DOT National Transportation Integrated Search
2004-03-23
Passenger and freight rail services are important links in the nation's transportation system. Terrorist attacks on passenger and/or freight rail services have the potential to cause widespread injury, loss of life, and economic disruption. The recen...
Daysal, N Meltem
2012-07-01
In this paper, I examine the impact of uninsured patients on the in-hospital mortality rate of insured heart attack patients. I employ panel data models using patient discharge and hospital financial data from California (1999-2006). My results indicate that uninsured patients have an economically significant effect that increases the mortality rate of insured heart attack patients. I show that these results are not driven by alternative explanations, including reverse causality, patient composition effects, sample selection or unobserved trends and that they are robust to a host of specification checks. The primary channel for the observed spillover effects is increased hospital uncompensated care costs. Although data limitations constrain my capacity to check how hospitals change their provision of care to insured heart attack patients in response to reduced revenues, the evidence I have suggests a modest increase in the quantity of cardiac services without a corresponding increase in hospital staff. Copyright © 2012 Elsevier B.V. All rights reserved.
Mishra, Dheerendra
2015-01-01
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-06-13
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens' quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%.
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
A Comparative Study of Anomaly Detection Techniques for Smart City Wireless Sensor Networks
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2016-01-01
In many countries around the world, smart cities are becoming a reality. These cities contribute to improving citizens’ quality of life by providing services that are normally based on data extracted from wireless sensor networks (WSN) and other elements of the Internet of Things. Additionally, public administration uses these smart city data to increase its efficiency, to reduce costs and to provide additional services. However, the information received at smart city data centers is not always accurate, because WSNs are sometimes prone to error and are exposed to physical and computer attacks. In this article, we use real data from the smart city of Barcelona to simulate WSNs and implement typical attacks. Then, we compare frequently used anomaly detection techniques to disclose these attacks. We evaluate the algorithms under different requirements on the available network status information. As a result of this study, we conclude that one-class Support Vector Machines is the most appropriate technique. We achieve a true positive rate at least 56% higher than the rates achieved with the other compared techniques in a scenario with a maximum false positive rate of 5% and a 26% higher in a scenario with a false positive rate of 15%. PMID:27304957
2016-04-01
infrastructure . The work is motivated by the fact that today’s clouds are very static, uniform, and predictable, allowing attackers who identify a...vulnerability in one of the services or infrastructure components to spread their effect to other, mission-critical services. Our goal is to integrate into...clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud’s infrastructure . Our work is
Wen, Fengtong
2013-12-01
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
Novel Duplicate Address Detection with Hash Function
Song, GuangJia; Ji, ZhenZhou
2016-01-01
Duplicate address detection (DAD) is an important component of the address resolution protocol (ARP) and the neighbor discovery protocol (NDP). DAD determines whether an IP address is in conflict with other nodes. In traditional DAD, the target address to be detected is broadcast through the network, which provides convenience for malicious nodes to attack. A malicious node can send a spoofing reply to prevent the address configuration of a normal node, and thus, a denial-of-service attack is launched. This study proposes a hash method to hide the target address in DAD, which prevents an attack node from launching destination attacks. If the address of a normal node is identical to the detection address, then its hash value should be the same as the “Hash_64” field in the neighboring solicitation message. Consequently, DAD can be successfully completed. This process is called DAD-h. Simulation results indicate that address configuration using DAD-h has a considerably higher success rate when under attack compared with traditional DAD. Comparative analysis shows that DAD-h does not require third-party devices and considerable computing resources; it also provides a lightweight security resolution. PMID:26991901
BaffleText: a Human Interactive Proof
NASA Astrophysics Data System (ADS)
Chew, Monica; Baird, Henry S.
2003-01-01
Internet services designed for human use are being abused by programs. We present a defense against such attacks in the form of a CAPTCHA (Completely Automatic Public Turing test to tell Computers and Humans Apart) that exploits the difference in ability between humans and machines in reading images of text. CAPTCHAs are a special case of 'human interactive proofs,' a broad class of security protocols that allow people to identify themselves over networks as members of given groups. We point out vulnerabilities of reading-based CAPTCHAs to dictionary and computer-vision attacks. We also draw on the literature on the psychophysics of human reading, which suggests fresh defenses available to CAPTCHAs. Motivated by these considerations, we propose BaffleText, a CAPTCHA which uses non-English pronounceable words to defend against dictionary attacks, and Gestalt-motivated image-masking degradations to defend against image restoration attacks. Experiments on human subjects confirm the human legibility and user acceptance of BaffleText images. We have found an image-complexity measure that correlates well with user acceptance and assists in engineering the generation of challenges to fit the ability gap. Recent computer-vision attacks, run independently by Mori and Jitendra, suggest that BaffleText is stronger than two existing CAPTCHAs.
Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence
NASA Astrophysics Data System (ADS)
Muraleedharan, Rajani; Ye, Xiang; Osadciw, Lisa Ann
2008-04-01
Security in wireless sensor networks is typically sacrificed or kept minimal due to limited resources such as memory and battery power. Hence, the sensor nodes are prone to Denial-of-service attacks and detecting the threats is crucial in any application. In this paper, the Sybil attack is analyzed and a novel prediction method, combining Bayesian algorithm and Swarm Intelligence (SI) is proposed. Bayesian Networks (BN) is used in representing and reasoning problems, by modeling the elements of uncertainty. The decision from the BN is applied to SI forming an Hybrid Intelligence Scheme (HIS) to re-route the information and disconnecting the malicious nodes in future routes. A performance comparison based on the prediction using HIS vs. Ant System (AS) helps in prioritizing applications where decisions are time-critical.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
Health as a target: South Africa's destabilization of Mozambique.
Cliff, J; Noormahomed, A R
1988-01-01
Since 1982 attacks on the health services have been an integral part of South African destabilization of Mozambique. After independence in 1975, Mozambique began successfully to implement a primary health care policy. By attacking primary health care units, kidnapping and killing health workers and destroying transport, a South African supported rebel movement has attempted to undermine this policy. The combined effects of the negative economic consequences of the war, the forced displacement of over a million people and the destruction and disruption of health services have worsened the health of the Mozambican people. Preventive programmes have been severely disrupted. Effects on health include an increase in mortality rates, famine and infectious disease epidemics. Similarities exist between this war and the low intensity conflict in Nicaragua. Given the intensity of the onslaught, the primary health care system has proved remarkably resistant to destruction.
Controlled mutual quantum entity authentication with an untrusted third party
NASA Astrophysics Data System (ADS)
Kang, Min-Sung; Heo, Jino; Hong, Chang-Ho; Yang, Hyung-Jin; Han, Sang-Wook; Moon, Sung
2018-07-01
We propose a quantum control entity mutual authentication protocol that can be executed in environments involving an untrusted third party. In general, the third party, referred to as Charlie, can be an entity such as a telephone company, server, financial company, or login webpage for a portal service. Most communication protocols controlled by third parties are vulnerable to internal attacks. In this study, we present two solutions that make use of an entanglement correlation checking method and random numbers against an internal attack by an untrusted third party.
2009-11-04
cloak and dagger in their training instead of what should be more matter-of-fact. On the positive side, many OSS direct action members attributed much...A.H. Mullick Hunter-Killer Teams: Attacking Enemy Safe Havens, January 2010, Joseph D. Celeski v Contents Preface... attack on Pearl Harbor and America’s entry into World War II, a need was perceived to create resistance in enemy areas from which the U.S. and its
Was there unmet mental health need after the September 11, 2001 terrorist attacks?
Stuber, Jennifer; Galea, Sandro; Boscarino, Joseph A; Schlesinger, Mark
2006-03-01
This study examined the use of professionals for mental health problems among New York City residents who were directly affected by the September 11, 2001 terrorist attacks on the World Trade Center (WTC) or had a probable diagnosis of post-traumatic stress disorder (PTSD) or depression in its aftermath. Correlates of help seeking from professionals for mental health problems after the attacks and barriers to care were also assessed. Data were from a random digit dial telephone survey of 2,752 adults representative of the Greater New York Metropolitan area conducted 6 months after the September 11 terrorist attacks. Fifteen percent of those directly affected and 36% of those with probable PTSD or depression sought help from a professional for a mental health problem after the attacks. There was little new utilization of professionals for mental health problems after the attacks among persons who were not already receiving care prior to September 11. Barriers that prevented people from seeking help for mental health problems 6 months after the September 11 attacks included traditional barriers to care (e.g., cost) and barriers that are unique to the post-disaster context (e.g., the belief that others need the services more than oneself). This study suggests that there was potential unmet mental health need in New York City 6 months after the September 11 attacks on the WTC, but these findings should be tempered by research showing an apparent decrease in population-rates of PTSD. In the aftermath of a disaster, interventions should target persons with mental health needs who were not previously seeking help from a professional for a mental health problem.
Design and Implementation of Secure Area Expansion Scheme for Public Wireless LAN Services
NASA Astrophysics Data System (ADS)
Watanabe, Ryu; Tanaka, Toshiaki
Recently, wireless LAN (WLAN) technology has become a major wireless communication method. The communication bandwidth is increasing and speeds have attained rates exceeding 100 Mbps. Therefore, WLAN technology is regarded as one of the promising communication methods for future networks. In addition, public WLAN connection services can be used in many locations. However, the number of the access points (AP) is insufficient for seamless communication and it cannot be said that users can use the service ubiquitously. An ad-hoc network style connection can be used to expand the coverage area of a public WLAN service. By relaying the user messages among the user nodes, a node can obtain an Internet connection via an AP, even though the node is located outside the AP's direct wireless connection area. Such a coverage area extending technology has many advantages thanks to the feature that no additional infrastructure is required. Therefore, there is a strong demand for this technology as it allows the cost-effective construction of future networks. When a secure ad-hoc routing protocol is used for message exchange in the WLAN service, the message routes are protected from malicious behavior such as route forging and can be maintained appropriately. To do this, however, a new node that wants to join the WLAN service has to obtain information such as the public key certificate and IP address in order to start secure ad-hoc routing. In other words, an initial setup is required for every network node to join the WLAN service properly. Ordinarily, such information should be assigned from the AP. However, new nodes cannot always contact an AP directly. Therefore, there are problems about information delivery in the initial setup of a network node. These problems originate in the multi hop connection based on the ad-hoc routing protocols. In order to realize an expanded area WLAN service, in this paper, the authors propose a secure public key certificate and address provision scheme during the initial setup phase on mobile nodes for the service. The proposed scheme also considers the protection of user privacy. Accordingly, none of the user nodes has to reveal their unique and persistent information to other nodes. Instead of using such information, temporary values are sent by an AP to mobile nodes and used for secure ad-hoc routing operations. Therefore, our proposed scheme prevents tracking by malicious parties by avoiding the use of unique information. Moreover, a test bed was also implemented based on the proposal and an evaluation was carried out in order to confirm performance. In addition, the authors describe a countermeasure against denial of service (DoS) attacks based on the approach to privacy protection described in our proposal.
2014-01-01
Background There is little current information about the unmet mental health care need (UMHCN) and reasons for it among those exposed to the World Trade Center (WTC) terrorist attacks. The purpose of this study was to assess the level of UMHCN among symptomatic individuals enrolled in the WTC Health Registry (WTCHR) in 2011–2012, and to analyze the relationship between UMHCN due to attitudinal, cost, and access factors and mental health symptom severity, mental health care utilization, health insurance availability, and social support. Methods The WTCHR is a prospective cohort study of individuals with reported exposure to the 2001 WTC attacks. This study used data from 9,803 adults who completed the 2003–2004 (Wave 1) and 2011–2012 (Wave 3) surveys and had posttraumatic stress disorder (PTSD) or depression in 2011–2012. We estimated logistic regression models relating perceived attitudinal, cost and access barriers to symptom severity, health care utilization, a lack of health insurance, and social support after adjusting for sociodemographic characteristics. Results Slightly more than one-third (34.2%) of study participants reported an UMHCN. Symptom severity was a strong predictor of UMHCN due to attitudinal and perceived cost and access reasons. Attitudinal UMHCN was common among those not using mental health services, particularly those with relatively severe mental health symptoms. Cost-related UMHCN was significantly associated with a lack of health insurance but not service usage. Access-related barriers were significantly more common among those who did not use any mental health services. A higher level of social support served as an important buffer against cost and access UMHCN. Conclusions A significant proportion of individuals exposed to the WTC attacks with depression or PTSD 10 years later reported an UMHCN, and individuals with more severe and disabling conditions, those who lacked health insurance, and those with low levels of social support were particularly vulnerable. PMID:24885506
An Evaluation of Alternative Delivery Modes for Information Services.
ERIC Educational Resources Information Center
Short, Craig; Christal, Melodie E.
The use of the floppy disk as an alternative mode for delivering Information Services reports was evaluated for fiscal year 1985 by the National Center for Higher Education Management Systems (NCHEMS). A 5.25 inch, 8/9 sector, 40 track ASCII floppy disk used under PC-DOS on the IBM PC and IBM PC compatible hardware was tested. Tabular data but not…
Logistics Force Planner Assistant (Log Planner)
1989-09-01
elements. The system is implemented on a MS-DOS based microcomputer, using the "Knowledge Pro’ software tool., 20 DISTRIBUTION/AVAILABILITY OF... service support structure. 3. A microcomputer-based knowledge system was developed and successfully demonstrated. Four modules of information are...combat service support (CSS) units planning process to Army Staff logistics planners. Personnel newly assigned to logistics planning need an
Prediction of fire spread following nuclear explosions
Craig C. Chandler; Theodore G. Storey; Charles D. Tangren
1963-01-01
Mass fires are likely to follow a nuclear attack. Since it is important to the civil defense program to be able to predict rate, duration, and extent of spread of such fires, the Office of Civil Defense, U.S. Department of Defense, issued a joint contract to the Forest Service and to United Research Services, Inc., to study this field. We surveyed the literature,...
ERIC Educational Resources Information Center
Pollack, William S.; Modzeleski, William; Rooney, Georgeann
2008-01-01
In the wake of several high-profile shootings at schools in the United States, most notably the shootings that occurred at Columbine High School on April 20, 1999, the United States Secret Service (Secret Service) and the United States Department of Education (ED) embarked on a collaborative endeavor to study incidents of planned (or…
Mommsen, Philipp; Bradt, Nikolas; Zeckey, Christian; Andruszkow, Hagen; Petri, Max; Frink, Michael; Hildebrand, Frank; Krettek, Christian; Probst, Christian
2012-01-01
In consideration of rising cost pressure in the German health care system, the usefulness of helicopter emergency medical service (HEMS) in terms of time- and cost-effectiveness is controversially discussed. The aim of the present study was to investigate whether HEMS is associated with significantly decreased arrival and transportation times compared to ground EMS. In a retrospective study, we evaluated 1,548 primary emergency missions for time sensitive diagnoses (multiple trauma, traumatic brain and burn injury, heart-attack, stroke, and pediatric emergency) performed by a German HEMS using the medical database, NADIN, of the German Air Rescue Service. Arrival and transportation times were compared to calculated ground EMS times. HEMS showed significantly reduced arrival times at the scene in case of heart-attack, stroke and pediatric emergencies. In contrast, HEMS and ground EMS showed comparable arrival times in patients with multiple trauma, traumatic brain and burn injury due to an increased flight distance. HEMS showed a significantly decreased transportation time to the closest centre capable of specialist care in all diagnosis groups (p<0.001). The results of the present study indicate the time-effectiveness of German air ambulance services with significantly decreased transportation times.
Microbiological corrosion of ASTM SA105 carbon steel pipe for industrial fire water usage
NASA Astrophysics Data System (ADS)
Chidambaram, S.; Ashok, K.; Karthik, V.; Venkatakrishnan, P. G.
2018-02-01
The large number of metallic systems developed for last few decades against both general uniform corrosion and localized corrosion. Among all microbiological induced corrosion (MIC) is attractive, multidisciplinary and complex in nature. Many chemical processing industries utilizes fresh water for fire service to nullify major/minor fire. One such fire water service line pipe attacked by micro-organisms leads to leakage which is industrially important from safety point of view. Also large numbers of leakage reported in similar fire water service of nearby food processing plant, paper & pulp plant, steel plant, electricity board etc…In present investigation one such industrial fire water service line failure analysis of carbon steel line pipe was analyzed to determine the cause of failure. The water sample subjected to various chemical and bacterial analyses. Turbidity, pH, calcium hardness, free chlorine, oxidation reduction potential, fungi, yeasts, sulphide reducing bacteria (SRB) and total bacteria (TB) were measured on water sample analysis. The corrosion rate was measured on steel samples and corrosion coupon measurements were installed in fire water for validating non flow assisted localized corrosion. The sulphide reducing bacteria (SRB) presents in fire water causes a localized micro biological corrosion attack of line pipe.
Bringing the medical library to the office desktop.
Brown, S R; Decker, G; Pletzke, C J
1991-01-01
This demonstration illustrates LRC Remote Computer Services- a dual operating system, multi-protocol system for delivering medical library services to the medical professional's desktop. A working model draws resources from CD-ROM and magnetic media file services, Novell and AppleTalk network protocol suites and gating, LAN and asynchronous (dial-in) access strategies, commercial applications for MS-DOS and Macintosh workstations and custom user interfaces. The demonstration includes a discussion of issues relevant to the delivery of said services, particularly with respect to maintenance, security, training/support, staffing, software licensing and costs.
2018-05-02
Heart Attack; Cardiac Arrest; Congestive Heart Failure; Atrial Fibrillation; Angina; Deep Vein Thrombosis; Pulmonary Embolism; Respiratory Arrest; Respiratory Failure; Pneumonia; Gastrointestinal Bleed; Stomach Ulcer; Delirium; Stroke; Nerve Injury; Surgical Wound Infection
Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M; Dinesen, Peter T
2016-10-01
The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined the consequences of the 9/11 attacks on mental disorders in the Kingdom of Denmark. Utilizing population data from the Danish Psychiatric Central Research Register from 1995 to 2012, we used a time-series intervention approach to estimate the change in the incidence rate of mental disorders after the 9/11 attacks. Based on analyses of 1,448,250 contacts with psychiatric services, we found that the attacks were followed by an immediate 16% increase in the incidence rate of trauma- and stressor-related disorders. This surge dissipated approximately a year after 9/11. In contrast, no similar increases were found for other disorders. This is consistent with the prominent role of external stressors in the etiology of trauma- and stressor-related disorders. The results indicate that the effects of 9/11 on mental disorders extended across the Atlantic Ocean to Denmark. Thus, the impact of terrorist attacks on mental health is likely not limited to inhabitants of the country under attack; it also extends to people far away and without immediate relation to it. © The Author 2016. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Hospitals: Soft Target for Terrorism?
De Cauwer, Harald; Somville, Francis; Sabbe, Marc; Mortelmans, Luc J
2017-02-01
In recent years, the world has been rocked repeatedly by terrorist attacks. Arguably, the most remarkable were: the series of four coordinated suicide plane attacks on September 11, 2001 on buildings in New York, Virginia, and Pennsylvania, USA; and the recent series of two coordinated attacks in Brussels (Belgium), on March 22, 2016, involving two bombings at the departure hall of Brussels International Airport and a bombing at Maalbeek Metro Station located near the European Commission headquarters in the center of Brussels. This statement paper deals with different aspects of hospital policy and disaster response planning that interface with terrorism. Research shows that the availability of necessary equipment and facilities (eg, personal protective clothing, decontamination rooms, antidotes, and anti-viral drugs) in hospitals clearly is insufficient. Emergency teams are insufficiently prepared: adequate and repetitive training remain necessary. Unfortunately, there are many examples of health care workers and physicians or hospitals being targeted in both political or religious conflicts and wars. Many health workers were kidnapped and/or killed by insurgents of various ideology. Attacks on hospitals also could cause long-term effects: hospital units could be unavailable for a long time and replacing staff could take several months, further compounding hospital operations. Both physical and psychological (eg, posttraumatic stress disorder [PTSD]) after-effects of a terrorist attack can be detrimental to health care services. On the other hand, physicians and other hospital employees have shown to be involved in terrorism. As data show that some offenders had a previous history with the location of the terror incident, the possibility of hospitals or other health care services being targeted by insiders is discussed. The purpose of this report was to consider how past terrorist incidents can inform current hospital preparedness and disaster response planning. De Cauwer H , Somville F , Sabbe M , Mortelmans LJ . Hospitals: soft target for terrorism? Prehosp Disaster Med. 2017;32(1):94-100.
Bigfoot or Big Mistake: Is CBP’s Expanding Footprint Helping or Hurting Homeland Security
2017-03-31
message. Since its founding in 1789, the U.S. Customs Service has guarded the U.S. ports of entry and collected tariffs on goods coming into the United...a nation’s innocence. Immediately after the attacks, Commissioner Bonner knew that a change in the mission of U.S. Customs Service was essential to...Department of Homeland Security (DHS). This included the U.S. Customs Service , U.S. Border Patrol, and U.S. Coast Guard. Title IV of the Act created
MacDonald, G S; Steiner, S R
1997-01-01
Emergency Medical Services-Early Heart Attack Care (EMS-EHAC) is a community-based program where paramedics increase the consumer's awareness about early chest pain symptom recognition. EMS-EHAC prevention, along with seamless chest pain care (between the paramedic and chest pain emergency department) can be the basis for an outcome-based study to examine the impact of advanced life support EMS. Studies that show the impact of care given by paramedics on the outcome of patient care must be designed to demonstrate the value and the cost benefit of providing advanced life support (ALS). Third party payers are going to examine if there are significant quality differences between ALS and basic life support (BLS) services. If significant benefits of ALS care cannot be demonstrated, the cost differences could potentially place the future of advanced life support paramedic programs in jeopardy. A positive outcome resulting in a lower acute cardiac event, and the realization of the cost benefits from the EMS-EHAC program could be utilized by EMS management to justify or expand advanced life support programs.
RUASN: a robust user authentication framework for wireless sensor networks.
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Planning the bioterrorism response supply chain: learn and live.
Brandeau, Margaret L; Hutton, David W; Owens, Douglas K; Bravata, Dena M
2007-01-01
Responses to bioterrorism require rapid procurement and distribution of medical and pharmaceutical supplies, trained personnel, and information. Thus, they present significant logistical challenges. On the basis of a review of the manufacturing and service supply chain literature, the authors identified five supply chain strategies that can potentially increase the speed of response to a bioterrorism attack, reduce inventories, and save money: effective supply chain network design; effective inventory management; postponement of product customization and modularization of component parts; coordination of supply chain stakeholders and appropriate use of incentives; and effective information management. The authors describe how concepts learned from published evaluations of manufacturing and service supply chains, as well as lessons learned from responses to natural disasters, naturally occurring outbreaks, and the 2001 US anthrax attacks, can be applied to design, evaluate, and improve the bioterrorism response supply chain. Such lessons could also be applied to the response supply chains for disease outbreaks and natural and manmade disasters.
Towards the cyber security paradigm of ehealth: Resilience and design aspects
NASA Astrophysics Data System (ADS)
Rajamäki, Jyri; Pirinen, Rauno
2017-06-01
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.
Tactical Firefighter Teams: Pivoting Toward the Fire Service’s Evolving Homeland Security Mission
2016-09-01
critical response command C-TECC Committee on Tactical Emergency Casualty Care EMS emergency medical services EMT emergency medical technician ESU...Interagency Tactical Response Model: Integrating Fire and EMS with Law Enforcement to Mitigate Mumbai-Style Terrorist Attacks (New York: FDNY Center...the assailants, several traditional fire and EMS activities must often occur simultaneously to successfully mitigate the threat. Although rare
Transitioning the Tactical Marine Corps to IPv6
2011-09-01
SUT System Under Test SYSCOM Systems Command (synonymous with MCSC) TCP Transmission Control Protocol TDS Tactical Data Systems TDN...capability to provide services to the Marine Corps Tactical Data Systems ( TDS ) and other DDS-M systems. The 2 DDS-M can function as the file server...Intelligence ( ATI ) program provides comprehensive application protocols and attacks, as well as feature updates and responsive service and support with
ERIC Educational Resources Information Center
Bergmann, Barbara R.
In the wake of welfare reform efforts, the government is willing to provide or finance a wide range of services for working parents and help them purchase child care and child health insurance. Taken together, these services represent a significant attack on child poverty. Based on a basic needs' budget for families and the high proportion of a…
ERIC Educational Resources Information Center
Williams, Dorinda Silver; Mulrooney, Kathleen
2012-01-01
The decade of war since the attacks of 9-11 have meant lengthy and repeated combat deployment for millions of service members, many of whom are parents of very young children. In addition to the many challenges inherent to the deployment cycle, issues such as injury, combat stress, and the death of a service member parent are important realities…
Historical review of termite activity at Forest Service termiticide test sites from 1971 to 2004
J.E. Mulrooney; T.L. Wagner; T.G. Shelton; C.J. Peterson; P.D. Gerard
2007-01-01
The U.S. Forest Service has a long history of providing termiticide efficacy data used for product registration and labeling. Four primary test sites (Arizona and Florida, Mississippi, and South Carolina [hereafter southeast]) have been used for this purpose. Various parameters of termite attack at water-only control plots were examined in this study to assess the...
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
Ultrabroadband photonic internet: safety aspects
NASA Astrophysics Data System (ADS)
Kalicki, Arkadiusz; Romaniuk, Ryszard
2008-11-01
Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.
Distributed reinforcement learning for adaptive and robust network intrusion response
NASA Astrophysics Data System (ADS)
Malialis, Kleanthis; Devlin, Sam; Kudenko, Daniel
2015-07-01
Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. Multiagent Router Throttling is a novel approach to defend against DDoS attacks where multiple reinforcement learning agents are installed on a set of routers and learn to rate-limit or throttle traffic towards a victim server. The focus of this paper is on online learning and scalability. We propose an approach that incorporates task decomposition, team rewards and a form of reward shaping called difference rewards. One of the novel characteristics of the proposed system is that it provides a decentralised coordinated response to the DDoS problem, thus being resilient to DDoS attacks themselves. The proposed system learns remarkably fast, thus being suitable for online learning. Furthermore, its scalability is successfully demonstrated in experiments involving 1000 learning agents. We compare our approach against a baseline and a popular state-of-the-art throttling technique from the network security literature and show that the proposed approach is more effective, adaptive to sophisticated attack rate dynamics and robust to agent failures.
Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution
NASA Astrophysics Data System (ADS)
Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon
The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on detecting heap spraying. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
Doing Business with the Naval Air Systems Command
2014-08-13
Small Businesses (WOSB) — Economically Disadvantaged Women-Owned Small Business (EDWOSB) — Small Disadvantaged Businesses ( SDB ) — Service-Disabled...PRECISION STRIKE WEAPONS SDB II JDAM JSOW SLAM-ER HARPOON DIRECT ATTACK WEAPONS AAE/FC CAD/PAD ADVANCED DEVELOPMENT
Testing the Chloride Penetration Resistance of Concrete : A Literature Review.
DOT National Transportation Integrated Search
2001-01-01
One of the major forms of environmental attack on reinforced concrete bridges is chloride ingress, which leads to corrosion of the reinforcing steel and a subsequent reduction in the strength, serviceability, and aesthetics of the structure.Reinforce...
NASA Astrophysics Data System (ADS)
Bassuoni, Mohamed Tamer F.
The growing use of self-consolidating concrete (SCC) in various infrastructure applications exposed to sulfate-rich environments necessitates conducting comprehensive research to evaluate its durability to external sulfate attack. Since the reliability and adequacy of standard sulfate immersion tests have been questioned, the current thesis introduced an integrated testing approach for assessing the durability of a wide scope of SCC mixtures to external sulfate attack. This testing approach involved progressive levels of complexity from single to multiple damage processes. A new series of sulfate attack tests involving multiple field-like parameters and combined damage mechanisms (various cations, controlled pH, wetting-drying, partial immersion, freezing-thawing, and cyclic cold-hot conditions with or without sustained flexural loading) were designed to evaluate the performance (suitability) of the SCC mixtures under various sulfate attack exposure scenarios. The main mixture design variables of SCC included the type of binder (single, binary, ternary and quaternary), air-entrainment, sand-to-aggregate mass ratio and hybrid fibre reinforcement. The comprehensive database and knowledge obtained from this research were used to develop smart models (fuzzy and neuro-fuzzy inference systems) based on artificial-intelligence to evaluate and predict the performance of the SCC mixtures under various sulfate attack exposure regimes implemented in this study. In full immersion tests involving high concentration sodium and magnesium sulfate solutions with controlled pH, the low penetrability of SCC was responsible for the high durability of specimens. Ternary and quaternary cementitious systems with or without limestone materials provided a passivating layer, with or without acid neutralization capacity, which protected SCC from severe damage in the aggressive sulfuric acid and ammonium sulfate solutions. In contrast to conclusions drawn from the sodium sulfate immersion tests, the combined sulfate attack tests captured performance risks and complex damage mechanisms associated with the SCC pore structure and constituent materials. Sodium sulfate attack with wetting-drying cycles and/or partial immersion under temperate-hot conditions synergistically caused significant damage to specimens, especially to quaternary cementitious systems having very fine pore structure, due to the build-up of salt crystals and sulfate reaction products. The deleterious effects of sulfate reaction products and salt crystallization on all cementitious systems were more severe under the combined sodium sulfate and freezing-thawing exposure, with a potential of sudden brittle failure. Laboratory experiments in the current work documented evidence for the occurrence of thaumasite sulfate attack (TSA) in cementitious systems containing limestone filler, not only under cold but also under temperate-hot conditions, which made specimens more vulnerable to damage in the combined sulfate attack tests. The field-like combined exposure of sodium sulfate, cyclic environments and flexural loading had synergistic effects on SCC specimens and caused the coexistence of multiple-complex degradation mechanisms (sulfate attack, TSA, stress-corrosion, salt crystallization, surface scaling and corrosion of surface steel fibres) depending on the mixture design variables. The current thesis demonstrates that relying only on sulfate immersion tests to evaluate the performance of cement-based materials can be risky. It also shows that linear and deterministic modeling of the performance of concrete structures under external sulfate attack is unrealistic. Fuzzy and adaptive-neuro fuzzy inference systems developed in the current thesis accurately and rationally predicted the serviceability, deterioration in engineering properties and time to failure of the SCC mixtures under the various sulfate attack exposure regimes adopted in the integrated testing approach. A durability evaluation factor from multiple performance criteria was created for the ammonium sulfate exposure. Environmental charts were developed to determine the level of aggression associated with sodium sulfate attack from temperature, RH and degree of wetting-drying expected in service. This novel modeling approach showed promising success in handling complex durability topics such as the sulfate attack of concrete, which involves non-linearity, ambiguity and interface with operator approximation. The current thesis provides needed fundamental knowledge on the durability of a wide scope of SCC mixtures to various sulfate attack exposure scenarios. It elucidates complex deterioration mechanisms and failure modes of cement-based materials under multi-mechanistic aging processes. It also proposes carefully engineered integrated sulfate attack tests that replicate various sulfate attack exposure regimes, which could be refined and standardized in the future. In addition, the current work introduced original knowledge-based smart models capable of handling uncertainty and providing reliable predictions for the behaviour of concrete under external sulfate attack. The models do not require conducting exhaustive laboratory experiments and/or making assumptions, thus facilitating the selection of optimum concrete mixtures for a specified exposure. Overall, this research should effectively contribute to the development of performance-based standards and specifications for, and improvement of durability-based design and life-cycle analysis of concrete structures subjected to external sulfate attack. Keywords. Sulfate attack, self-consolidating concrete, integrated testing, composite cements, air-entrainment, hybrid fibres, full immersion, cations, pH, wetting-drying, partial immersion, freezing-thawing, cyclic cold-hot conditions, flexural loading, thaumasite, salt crystallization, fuzzy, neuro-fuzzy, systems.
Association of PTSD symptoms with asthma attacks among hurricane Katrina survivors.
Arcaya, Mariana C; Lowe, Sarah R; Rhodes, Jean E; Waters, Mary C; Subramanian, S V
2014-12-01
The relationship between posttraumatic stress disorder (PTSD) and asthma in the wake of natural disasters is poorly understood. Using pre- and postdisaster data (N = 405) from the Resilience in Survivors of Katrina (RISK) project, we examined associations between PTSD symptoms, measured by the Impact of Event Scale-Revised (IES-R), and self-reported postdisaster asthma attacks. A 1-point increase in the IES-R avoidance score, which corresponded to one standard deviation change in this sample, was associated with double the odds of reporting an asthma attack or episode since the hurricane, 95% CI Revise spacing among characters: [1.22, 4.16]. Association with hyperarousal and intrusion symptoms was null. Further research using objective measures of asthma morbidity is needed; nevertheless, these findings may help inform postdisaster health services delivery and predisaster mitigation planning. Copyright © 2014 International Society for Traumatic Stress Studies.
An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Mendis, Gihan J.; He, Youbiao
In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complementmore » the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Transport Traffic Analysis for Abusive Infrastructure Characterization
2012-12-14
Introduction Abusive traffic abounds on the Internet, in the form of email, malware, vulnerability scanners, worms, denial-of-service, drive-by-downloads, scam ...insight is two-fold. First, attackers have a basic requirement to source large amounts of data, be it denial-of-service, scam -hosting, spam, or other...the network core. This paper explores the power of transport-layer traffic analysis to detect and characterize scam hosting infrastructure, including
U.S. Navy - U.S. Air Force Relationships 1970-2010. Revision
2011-06-01
OK(1992) • Inherited Looking Glass National Command Authorities (NCA) airborne strategic command & control role from USAF (1998) • Multi-role E...begins JTF HOA begins OIF begins PSI begins Iraq ABOT attack Indian Ocean tsunami Hurricane Katrina Bali terror bombings Lebanon evacuation DPRK...II) ^*NA • Material • Rising overall defense budgets • Stability of service budget shares • Imposed ceilings on service budgets • Personal
BACTrack: A Surveillance Technique for Detecting and Locating Bioagent Attacks
2003-06-10
Implementation • Location History – Location tracking/storage using cell - phone network (geo-location mandated by 2006) • Subscription Services...Reporting – User reports symptoms through automated cell - phone interface using password Individual reports only releasable with password Summary...Earlier detection and location relative to medical surveillance • The cell - phone location based service market can offer a means to implement BACTrack and to distribute its costs
Evaluation, presentation and repair of microbial acid-produced attack of concrete.
DOT National Transportation Integrated Search
2011-10-01
The Texas Department of Transportation (TxDOT) has approximately 50,000 bridges in its inventory and the : deterioration of concrete under these bridges, most of which are reinforced, has been a critical issue affecting : the service condition. Recen...
A Statistical Framework for Analyzing Cyber Threats
defender cares most about the attacks against certain ports or services). The grey-box statistical framework formulates a new methodology of Cybersecurity ...the design of prediction models. Our research showed that the grey-box framework is effective in predicting cybersecurity situational awareness.
Toward Exposing Timing-Based Probing Attacks in Web Applications †
Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai
2017-01-01
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. PMID:28245610
Toward Exposing Timing-Based Probing Attacks in Web Applications.
Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai
2017-02-25
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.
Attack Classification Schema for Smart City WSNs
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-01-01
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. PMID:28379192
Attack Classification Schema for Smart City WSNs.
Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena
2017-04-05
Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 29.3017 Section 29.3017 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Damage. The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 30.17 Section 30.17 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Damage. The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 2 2010-01-01 2010-01-01 false Damage. 29.2263 Section 29.2263 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing.... The effect of mold, must, rot, black rot, or other fungous or bacterial diseases which attack tobacco...
Economic-Analysis Program for a Communication System
NASA Technical Reports Server (NTRS)
Chamberlain, R. G.
1986-01-01
Prices and profits of alternative designs compared. Objective of Land Mobile Satellite Service Finance Report (LMSS) program is to provide means for comparing alternative designs of LMSS systems. Program is Multiplan worksheet program. Labels used in worksheet chosen for satellite-based cellular communication service, but analysis not restricted to such cases. LMSS written for interactive execution with Multiplan (version 1.2) and implemented on IBM PC series computer operating under DOS (version 2.11).
Cyber Event Artifact Investigation Training in a Virtual Environment
2017-12-01
Rolling Box) and several Windows versions with few patches, often having only the 1st Service Pack. We selected a WinOS VM for our Training and...or services are currently in use by that account. In the Training Lab, the suspicious (i.e., attacker created) account is viewable from the login...ARTIFACT INVESTIGATION TRAINING IN A VIRTUAL ENVIRONMENT by Simone M. Mims Tye R. Wylkynsone December 2017 Thesis Advisor: J.D. Fulp Second
2008-09-01
rich mix of medical services that range from simple ambulatory visits to plastic surgery , neuro- surgery , general surgery , bariatric , ophthalmology...CENTER SAN DIEGO NMCSD is a 266-bed tertiary care facility providing patient services ranging from same day surgery to brain surgery . The hospital...orthopedics, cardiology, thoracic surgery , vascular surgery , transient ischemic attack/cerebro vascular accident (TIA/CVA), OB/GYN, urology, non
Markets for Cybercrime Tools and Stolen Information: Hackers’ Bazaar
2014-01-01
Bitcoin . Others include Pecunix, AlertPay, PPcoin, Litecoin, Feathercoin, and Bitcoin extensions, such as Zerocoin. There is no consensus on which form...purpose of targeting wallets and bitcoins . It is difficult to assess trends for different products; product/price relationships can be quite nuanced and...for DDoS attacks against digital currencies (e.g., Bitcoin ) DDoS-for-hire services begin Renewed interest in DDoS-for-hire services General Spam
Corrigan, Malachy; McWilliams, Rita; Kelly, Kerry J; Niles, Justin; Cammarata, Claire; Jones, Kristina; Wartenberg, Daniel; Hallman, William K; Kipen, Howard M; Glass, Lara; Schorr, John K; Feirstein, Ira; Prezant, David J
2009-11-01
We sought to determine the frequency of psychological symptoms and elevated posttraumatic stress disorder (PTSD) risk among New York City firefighters after the World Trade Center (WTC) attack and whether these measures were associated with Counseling Services Unit (CSU) use or mental health-related medical leave over the first 2.5 years after the attack. Shortly after the WTC attack, a computerized, binary-response screening questionnaire was administered. Exposure assessment included WTC arrival time and "loss of a co-worker while working at the collapse." We determined elevated PTSD risk using thresholds derived from Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision, and a sensitivity-specificity analysis. Of 8487 participants, 76% reported at least 1 symptom, 1016 (12%) met criteria for elevated PTSD risk, and 2389 (28%) self-referred to the CSU, a 5-fold increase from before the attack. Higher scores were associated with CSU use, functional job impairment, and mental health-related medical leave. Exposure-response gradients were significant for all outcomes. This screening tool effectively identified elevated PTSD risk, higher CSU use, and functional impairment among firefighters and therefore may be useful in allocating scarce postdisaster mental health resources.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
Computational Aeroelastic Analysis of Ares Crew Launch Vehicle Bi-Modal Loading
NASA Technical Reports Server (NTRS)
Massey, Steven J.; Chwalowski, Pawel
2010-01-01
A Reynolds averaged Navier-Stokes analysis, with and without dynamic aeroelastic effects, is presented for the Ares I-X launch vehicle at transonic Mach numbers and flight Reynolds numbers for two grid resolutions and two angles of attack. The purpose of the study is to quantify the force and moment increment imparted by the sudden transition from fully separated flow around the crew module - service module junction to that of the bi-modal flow state in which only part of the flow reattaches. The bi-modal flow phenomenon is of interest to the guidance, navigation and control community because it causes a discontinuous jump in forces and moments. Computations with a rigid structure at zero zero angle of attack indicate significant increases in normal force and pitching moment. Dynamic aeroelastic computations indicate the bi-modal flow state is insensitive to vehicle flexibility due to the resulting deflections imparting only very small changes in local angle of attack. At an angle of attack of 2.5deg, the magnitude of the pitching moment increment resulting from the bi-modal state nearly triples, while occurring at a slightly lower Mach number. Significant grid induced variations between the solutions indicate that further grid refinement is warranted.
Civilian casualties of Iraqi ballistic missile attack to Tehran, capital of Iran.
Khaji, Ali; Fallahdoost, Shoaodin; Soroush, Mohammad-Reza; Rahimi-Movaghar, Vafa
2012-01-01
To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile). Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile). During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24%) were excluded due to the lack of information. Among the remainders, 179 (55.8%) were male and 142 (44.2%) were female. The mean age of the victims was 25.3 years+/-19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded areas is the major cause of high mortality in Tehran. The presence of suitable warning system and shelters could reduce civilian casualties. The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile attacks are necessary.
Palgi, Yuval; Shrira, Amit; Hamama-Raz, Yaira; Palgi, Sharon; Goodwin, Robin; Ben-Ezra, Menachem
2014-05-01
The present study examined whether recollections of the World Trade Center (WTC) terror attack and previous hurricanes moderated the relationship between exposure to Hurricane Sandy and related posttraumatic stress disorder (PTSD) symptoms. An online sample of 1000 participants from affected areas completed self-report questionnaires a month after Hurricane Sandy hit the East Coast of the United States. Participants reported their exposure to Hurricane Sandy, their PTSD symptoms, and recollections of the WTC terror attack and previous hurricanes elicited due to Hurricane Sandy. Exposure to Hurricane Sandy was related to PTSD symptoms among those with high level of recollections of the WTC terror attack and past hurricanes, but not among those with low level of recollections. The aftermath of exposure to Hurricane Sandy is related not only to exposure, but also to its interaction with recollections of past traumas. These findings have theoretical and practical implications for practitioners and health policy makers in evaluating and interpreting the impact of past memories on future natural disasters. This may help in intervention plans of social and psychological services. Copyright © 2014 Elsevier Inc. All rights reserved.
GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation
Li, Hong; Lu, Mingquan
2017-01-01
Spoofing attacks are threatening the global navigation satellite system (GNSS). The maximum likelihood estimation (MLE)-based positioning technique is a direct positioning method originally developed for multipath rejection and weak signal processing. We find this method also has a potential ability for GNSS anti-spoofing since a spoofing attack that misleads the positioning and timing result will cause distortion to the MLE cost function. Based on the method, an estimation-cancellation approach is presented to detect spoofing attacks and recover the navigation solution. A statistic is derived for spoofing detection with the principle of the generalized likelihood ratio test (GLRT). Then, the MLE cost function is decomposed to further validate whether the navigation solution obtained by MLE-based positioning is formed by consistent signals. Both formulae and simulations are provided to evaluate the anti-spoofing performance. Experiments with recordings in real GNSS spoofing scenarios are also performed to validate the practicability of the approach. Results show that the method works even when the code phase differences between the spoofing and authentic signals are much less than one code chip, which can improve the availability of GNSS service greatly under spoofing attacks. PMID:28665318
GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation.
Wang, Fei; Li, Hong; Lu, Mingquan
2017-06-30
Spoofing attacks are threatening the global navigation satellite system (GNSS). The maximum likelihood estimation (MLE)-based positioning technique is a direct positioning method originally developed for multipath rejection and weak signal processing. We find this method also has a potential ability for GNSS anti-spoofing since a spoofing attack that misleads the positioning and timing result will cause distortion to the MLE cost function. Based on the method, an estimation-cancellation approach is presented to detect spoofing attacks and recover the navigation solution. A statistic is derived for spoofing detection with the principle of the generalized likelihood ratio test (GLRT). Then, the MLE cost function is decomposed to further validate whether the navigation solution obtained by MLE-based positioning is formed by consistent signals. Both formulae and simulations are provided to evaluate the anti-spoofing performance. Experiments with recordings in real GNSS spoofing scenarios are also performed to validate the practicability of the approach. Results show that the method works even when the code phase differences between the spoofing and authentic signals are much less than one code chip, which can improve the availability of GNSS service greatly under spoofing attacks.
Braun-Lewensohn, Orna; Sagy, Shifra; Roth, Guy
2011-02-01
Employing the salutogenic approach (Antonovsky, 1987), this pilot study aimed at exploring the mediation effect of Sense of Coherence (SOC) on the relationships between exposure to missile attacks and stress-related reactions among adolescents. A strong SOC means a tendency to see the world as more comprehensible, manageable and meaningful. Data were gathered during August 2006 (Second Lebanon War) from 230 Israeli adolescents, 12-18 years old. Adolescents filled out self-reported questionnaires, including demographics, level of physical exposure, SOC, Scale of Psychological Distress (SPD), State Anxiety and State Anger. Exposure to missile attacks was found to be significantly positively linked to stress reactions; exposure was negatively linked to SOC which was also negatively linked to stress reactions. The mediation hypothesis was supported, with SOC mediating the effect of exposure to missile attacks on stress reactions. It seems that SOC may have a protective effect against stress reactions among adolescents exposed to political violence. This should be further studied in a longitudinal research. Copyright © 2010 The Association for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Network traffic anomaly prediction using Artificial Neural Network
NASA Astrophysics Data System (ADS)
Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea
2017-03-01
As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.
Water security - Nation state and international security implications
Tindall, James A.; Andrew A. Campbell,
2009-01-01
A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888
Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita
2014-05-01
Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.
Report of the Defense Science Board Task Force On Information Warfare - Defense (IW-D)
1996-11-01
pathogens. Partnerships NCID provides epidemiological, microbiologic , and consultative services to federal agencies, state and local health departments...FOR DETECTING LOCAL OR LARGE-SCALE ATTACKS, AND FOR ADAPTATION TO SUPPORT GRACEFUL DEGRADATION * TESi •BEDS AND SIMULATION-BASED MECHANISMS FOR
High Assurance Models for Secure Systems
ERIC Educational Resources Information Center
Almohri, Hussain M. J.
2013-01-01
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
"Kneecapping" Academic Freedom
ERIC Educational Resources Information Center
Kuehn, Robert R.; Joy, Peter A.
2010-01-01
This year, across the nation, state legislators and powerful corporate interests with financial ties to universities and influence over them have launched an unprecedented number of attacks on law school clinics. As universities increasingly seek to educate students through service-learning courses, law school clinics may be the bellwether for…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
...Title I of the James Zadroga 9/11 Health and Compensation Act of 2010 amended the Public Health Service Act (PHS Act) by adding Title XXXIII, which establishes the World Trade Center (WTC) Health Program. The WTC Health Program is administered by the Director of the National Institute for Occupational Safety and Health (NIOSH), within the Centers for Disease Control and Prevention (CDC), in the Department of Health and Human Services (HHS), and provides medical monitoring and treatment to eligible firefighters and related personnel, law enforcement officers, and rescue, recovery, and cleanup workers who responded to the September 11, 2001, terrorist attacks in New York City, Shanksville, Pennsylvania, and at the Pentagon, and to eligible survivors of the New York City attacks. Section 3311(a)(2)(C) of the PHS Act requires the WTC Program Administrator (Administrator) to develop eligibility criteria for enrollment of Shanksville, Pennsylvania and Pentagon responders. This interim final rule establishes those eligibility criteria.
Nacelle Aerodynamic and Inertial Loads (NAIL) project
NASA Technical Reports Server (NTRS)
1982-01-01
A flight test survey of pressures measured on wing, pylon, and nacelle surfaces and of the operating loads on Boeing 747/Pratt & Whitney JT9D-7A nacelles was made to provide information on airflow patterns surrounding the propulsion system installations and to clarify processes responsible for inservice deterioration of fuel economy. Airloads at takeoff rotation were found to be larger than at any other normal service condition because of the combined effects of high angle of attack and high engine airflow. Inertial loads were smaller than previous estimates indicated. A procedure is given for estimating inlet airloads at low speeds and high angles of attack for any underwing high bypass ratio turbofan installation approximately resembling the one tested. Flight procedure modifications are suggested that may result in better fuel economy retention in service. Pressures were recorded on the core cowls and pylons of both engine installations and on adjacent wing surfaces for use in development of computer codes for analysis of installed propulsion system aerodynamic drag interference effects.
NASA Astrophysics Data System (ADS)
de Carvalho Nunes, Frederico; de Almeida, Luiz Henrique; Ribeiro, André Freitas
2006-12-01
HK steels are among the most used heat-resistant cast stainless steels, being corrosion-resistant and showing good mechanical properties at high service temperatures. These steels are widely used in reformer furnaces and as superheater tubes. During service, combustion gases leaving the burners come in contact with these tubes, resulting in corrosive attack and a large weight loss occurs due to the presence of vanadium, which forms low melting point salts, removing the protective oxide layer. In this work the external surface of a tube with dramatic wall thickness reduction was analyzed using light microscopy, scanning electron microscopy, and transmission electron microscopy. The identification of the phases was achieved by energy dispersive spectroscopy (EDS) analyses. The results showed oxides arising from the external surface. In this oxidized region vanadium compounds inside chromium carbide particles were also observed, due to inward vanadium diffusion during corrosion attack. A chemical reaction was proposed to explain the presence of vanadium in the metal microstructure.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hay, M.G.; Baron, J.J.; Moffat, T.A.
1996-08-01
Types S31600 and S31254 stainless steel heat exchanger plates have suffered crevice corrosion and stress corrosion cracking under gaskets in rich amine service in a sour gas plant. The gasket material, ethylene-propylene-diene monomer (EPDM), has been used successfully for many years at other sour gas plants. Laboratory testing has duplicated the corrosion observed and shown that the mechanism is synergistic sulfide-halide attack. The use of a bromine plus chlorine-activated curing system for the EPDM rubber gaskets provided the necessary halides. Laboratory testing identified some nickel-based superalloys which were resistant to this corrosion and also demonstrated that essentially halogen-free, peroxide-cured EPDMmore » gaskets do not cause attack of S31600 or S31254. The heat exchanger packs were replaced with S31600 plates and peroxide-cured EPDM gaskets having a specified total halogen concentration of 200 ppm maximum. Field operating experience has been excellent.« less
Maddula, Mohana; Adams, Laura; Donnelly, Jonathan
2018-06-01
Background : Transient Ischaemic Attacks (TIA) should be treated as a medical emergency. While high-risk TIAs have higher stroke risks than low-risk patients, there is an inherent limitation to this risk stratification, as some low-risk patients may have undiagnosed high-risk conditions. Inequity of care for TIA patients was observed, such that high-risk patients received urgent assessment through acute admission, while low-risk patients faced long waits for clinical consultation. A redesign of the TIA service was planned to offer timely assessment for all patients and avoid acute admission for high-risk patients. Methods : Service reconfiguration was undertaken to set up a daily weekday rapid access TIA clinic where patients would be assessed, investigated, and treated. Results : A re-audit of clinic performance showed a significant increase in the number of patients seen in the ages of 18 to 52. The median time from referral to clinical consultation improved from 10 days to 1. There were similar significant improvements seen in median time to brain imaging (from 10.5 days to 1), and carotid ultrasound (from 10 days to all scans being performed on the same day). Conclusions : The redesigned service achieved the objective of offering urgent assessment and investigations for all TIA patients, including low-risk patients, while avoiding the acute admission for high-risk patients. We share our experience of establishing a successful rapid access ambulatory service without any additional resources.
Service Modeling for Service Engineering
NASA Astrophysics Data System (ADS)
Shimomura, Yoshiki; Tomiyama, Tetsuo
Intensification of service and knowledge contents within product life cycles is considered crucial for dematerialization, in particular, to design optimal product-service systems from the viewpoint of environmentally conscious design and manufacturing in advanced post industrial societies. In addition to the environmental limitations, we are facing social limitations which include limitations of markets to accept increasing numbers of mass-produced artifacts and such environmental and social limitations are restraining economic growth. To attack and remove these problems, we need to reconsider the current mass production paradigm and to make products have more added values largely from knowledge and service contents to compensate volume reduction under the concept of dematerialization. Namely, dematerialization of products needs to enrich service contents. However, service was mainly discussed within marketing and has been mostly neglected within traditional engineering. Therefore, we need new engineering methods to look at services, rather than just functions, called "Service Engineering." To establish service engineering, this paper proposes a modeling technique of service.
2010-06-11
Albert Maslow , “Maslow’s Hierarchy of Needs .” Maslow describes basic needs as “physiological, safety, love, esteem, and self-actualization” and...Maslow’s Hierarchy of Needs Essential Service (Consolidated) DoD Definitions DoS Definitions Dept. of Army Definitions Physiological...the physiological and safety needs identified by Maslow . However, it 52 is also evident there are several services that do not directly correlate
CD-ROM Growth: Unleashing the Potential.
ERIC Educational Resources Information Center
Nelson, Nancy Melin
1991-01-01
Discusses the use of CD-ROMs in library processing and public services units. Topics discussed include local area networks, workstations, network security, search software, disk operating systems (DOS), computer viruses, CD-ROM selection and acquisition, licensing, and standards. A sidebar lists current CD-ROM products appropriate for reference…
An Examination of Issues Surrounding Information Security in California Colleges
ERIC Educational Resources Information Center
Butler, Robert D.
2013-01-01
Technological advances have provided increasing opportunities in higher education for delivering instruction and other services. However, exposure to information security attacks has been increasing as more organizations conduct their businesses online. Higher education institutions have one of the highest frequencies of security breaches as…
21 CFR 12.90 - Conduct at oral hearings or conferences.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 12.90 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL... ethics. They may not indulge in personal attacks, unseemly wrangling, or intemperate accusations or... and ethical conduct during any hearing, constitute grounds for immediate exclusion from the proceeding...
21 CFR 12.90 - Conduct at oral hearings or conferences.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 12.90 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL... ethics. They may not indulge in personal attacks, unseemly wrangling, or intemperate accusations or... and ethical conduct during any hearing, constitute grounds for immediate exclusion from the proceeding...
21 CFR 12.90 - Conduct at oral hearings or conferences.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Section 12.90 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL... ethics. They may not indulge in personal attacks, unseemly wrangling, or intemperate accusations or... and ethical conduct during any hearing, constitute grounds for immediate exclusion from the proceeding...
21 CFR 12.90 - Conduct at oral hearings or conferences.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Section 12.90 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL... ethics. They may not indulge in personal attacks, unseemly wrangling, or intemperate accusations or... and ethical conduct during any hearing, constitute grounds for immediate exclusion from the proceeding...
21 CFR 12.90 - Conduct at oral hearings or conferences.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Section 12.90 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL... ethics. They may not indulge in personal attacks, unseemly wrangling, or intemperate accusations or... and ethical conduct during any hearing, constitute grounds for immediate exclusion from the proceeding...
Code of Federal Regulations, 2011 CFR
2011-01-01
... at the heart of our country. The Americans we lost came from every color, faith, and station. They... as a result of the terrorist attacks of September 11, 2001. IN WITNESS WHEREOF, I have hereunto set...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-09
..., Political candidates. Federal Communications Commission. Thomas Horan Chief of Staff, Media Bureau. For the... Doctrine, Personal Attacks, Political Editorials and Complaints Regarding Cable Programming Service Rates..., contact Katie Costello, [email protected] of the Media Bureau, Policy Division, (202) 418-2233...
Comer, Jonathan S.; Kerns, Caroline E.; Elkins, R. Meredith; Edson, Aubrey L.; Chou, Tommy; Dantowitz, Annie; Miguel, Elizabeth; Brown, Bonnie; Coxe, Stefany; Green, Jennifer Greif
2014-01-01
Background Following the Boston Marathon attack, the extraordinary interagency manhunt and shelter-in-place made for a truly unprecedented experience for area families. Although research on Boston youth has found robust associations between manhunt-related experiences and post-attack functioning, such work does little to identify the specific needs of a particularly vulnerable population—i.e., children with a relative who participated in the manhunt. Understanding the adjustment of these youth is critical for informing clinical efforts. Methods Survey of Boston-area parents/caretakers (N = 460) reporting on their child’s attack/manhunt-related experiences, as well as psychosocial functioning in the first six post-attack months; analyses compared youth with and without a relative in law enforcement or the armed services who participated in the manhunt. Results The proportion of youth with likely PTSD was 5.7 times higher among youth with relatives in the manhunt than among youth without. After accounting for child demographics, blast exposure, and children’s own exposure to manhunt events (e.g., hearing/seeing gunfire/explosions, having officers enter/search home), having a relative in the manhunt significantly predicted child PTSD symptoms, emotional symptoms, and hyperactivity/inattention. Fear during the manhunt that a loved one could be hurt mediated relationships between having a relative in the manhunt and clinical outcomes; living within the zone of greatest manhunt activity did not moderate observed relationships. Conclusions Children with relatives called upon to participate in the unprecedented interagency manhunt following the Boston Marathon attack carried a particularly heavy mental health burden. Continued research is needed to clarify the clinical needs of youth with relatives in high-risk occupations. PMID:24865569
Comer, Jonathan S; Kerns, Caroline E; Elkins, R Meredith; Edson, Aubrey L; Chou, Tommy; Dantowitz, Annie; Miguel, Elizabeth; Brown, Bonnie; Coxe, Stefany; Green, Jennifer Greif
2014-07-01
Following the Boston Marathon attack, the extraordinary interagency manhunt and shelter-in-place made for a truly unprecedented experience for area families. Although research on Boston youth has found robust associations between manhunt-related experiences and post-attack functioning, such work does little to identify the specific needs of a particularly vulnerable population--i.e., children with a relative who participated in the manhunt. Understanding the adjustment of these youth is critical for informing clinical efforts. Survey of Boston-area parents/caretakers (N = 460) reporting on their child's attack/manhunt-related experiences, as well as psychosocial functioning in the first six post-attack months; analyses compared youth with and without a relative in law enforcement or the armed services who participated in the manhunt. The proportion of youth with likely PTSD was 5.7 times higher among youth with relatives in the manhunt than among youth without. After accounting for child demographics, blast exposure, and children's own exposure to manhunt events (e.g., hearing/seeing gunfire/explosions, having officers enter/search home), having a relative in the manhunt significantly predicted child PTSD symptoms, emotional symptoms, and hyperactivity/inattention. Fear during the manhunt that a loved one could be hurt mediated relationships between having a relative in the manhunt and clinical outcomes; living within the zone of greatest manhunt activity did not moderate observed relationships. Children with relatives called upon to participate in the unprecedented interagency manhunt following the Boston Marathon attack carried a particularly heavy mental health burden. Continued research is needed to clarify the clinical needs of youth with relatives in high-risk occupations. © 2014 Wiley Periodicals, Inc.
Cao, Yuan; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-01
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μm2 and consumes a power as low as 5.16 μW per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of −40∼120 ∘C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications. PMID:29360790
Cao, Yuan; Zhao, Xiaojin; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-23
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μ m 2 and consumes a power as low as 5.16 μ W per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of -40∼120 ∘ C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications.
A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network.
Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue
2017-03-09
With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.
An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
NASA Astrophysics Data System (ADS)
Cui, Yongrui; Li, Mingchu; Ren, Yizhi; Sakurai, Kouichi
A novel adaptive reputation-based virtual organization formation is proposed. It restrains the bad performers effectively based on the consideration of the global experience of the evaluator and evaluates the direct trust relation between two grid nodes accurately by consulting the previous trust value rationally. It also consults and improves the reputation evaluation process in PathTrust model by taking account of the inter-organizational trust relationship and combines it with direct and recommended trust in a weighted way, which makes the algorithm more robust against collusion attacks. Additionally, the proposed algorithm considers the perspective of the VO creator and takes required VO services as one of the most important fine-grained evaluation criterion, which makes the algorithm more suitable for constructing VOs in grid environments that include autonomous organizations. Simulation results show that our algorithm restrains the bad performers and resists against fake transaction attacks and badmouth attacks effectively. It provides a clear advantage in the design of a VO infrastructure.
The phenomenology of the first panic attack in clinical and community-based samples.
Pané-Farré, Christiane A; Stender, Jan P; Fenske, Kristin; Deckert, Jürgen; Reif, Andreas; John, Ulrich; Schmidt, Carsten Oliver; Schulz, Andrea; Lang, Thomas; Alpers, Georg W; Kircher, Tilo; Vossbeck-Elsebusch, Anna N; Grabe, Hans J; Hamm, Alfons O
2014-08-01
The purpose of the study was to contrast first panic attacks (PAs) of patients with panic disorder (PD) with vs. without agoraphobia and to explore differences between first PAs leading to the development of PD and those that remain isolated. Data were drawn from a community survey (N=2259 including 88 isolated PAs and 75 PD cases). An additional sample of 234 PD patients was recruited in a clinical setting. A standardized interview assessed the symptoms of the first PA, context of its occurrence and subsequent coping attempts. Persons who developed PD reported more severe first PAs, more medical service utilization and exposure-limiting coping attempts than those with isolated PAs. The context of the first PA did not differ between PD and isolated PAs. PD with agoraphobia was specifically associated with greater symptom severity and occurrence of first attacks in public. Future research should validate these findings using a longitudinal approach. Copyright © 2014 Elsevier Ltd. All rights reserved.
A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks
Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue
2017-01-01
With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes. PMID:28282962
Internet firewalls: questions and answers
NASA Astrophysics Data System (ADS)
Ker, Keith
1996-03-01
As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.
Biological Warfare Plan in the 17th Century—the Siege of Candia, 1648–1669
Thalassinou, Eleni; Poulakou-Rebelakou, Effie; Hatzakis, Angelos
2015-01-01
A little-known effort to conduct biological warfare occurred during the 17th century. The incident transpired during the Venetian–Ottoman War, when the city of Candia (now Heraklion, Greece) was under siege by the Ottomans (1648–1669). The data we describe, obtained from the Archives of the Venetian State, are related to an operation organized by the Venetian Intelligence Services, which aimed at lifting the siege by infecting the Ottoman soldiers with plague by attacking them with a liquid made from the spleens and buboes of plague victims. Although the plan was perfectly organized, and the deadly mixture was ready to use, the attack was ultimately never carried out. The conception and the detailed cynical planning of the attack on Candia illustrate a dangerous way of thinking about the use of biological weapons and the absence of reservations when potential users, within their religious framework, cast their enemies as undeserving of humanitarian consideration. PMID:26894254
Securing Ground Data System Applications for Space Operations
NASA Technical Reports Server (NTRS)
Pajevski, Michael J.; Tso, Kam S.; Johnson, Bryan
2014-01-01
The increasing prevalence and sophistication of cyber attacks has prompted the Multimission Ground Systems and Services (MGSS) Program Office at Jet Propulsion Laboratory (JPL) to initiate the Common Access Manager (CAM) effort to protect software applications used in Ground Data Systems (GDSs) at JPL and other NASA Centers. The CAM software provides centralized services and software components used by GDS subsystems to meet access control requirements and ensure data integrity, confidentiality, and availability. In this paper we describe the CAM software; examples of its integration with spacecraft commanding software applications and an information management service; and measurements of its performance and reliability.
Kerr, Enda; Arulraj, Nolan; Scott, Maggie; McDowall, Mike; van Dijke, Margrethe; Keir, Sarah; Sandercock, Peter; Dennis, Martin
2010-07-02
Patients with transient ischaemic attack or stroke benefit from early diagnosis, specialist assessment, and treatment with thrombolysis, and from stroke unit care and secondary prevention. The challenge with such patients is to minimise delays and ensure that treatment is appropriate, and to provide this care with the available resources. An ongoing prospective audit of a transient ischaemic attack and stroke clinic (1 January 2005 to 30 September 2009), as part of the Scottish Stroke Care Audit, and a three month targeted audit of immediate telephone access to a specialist stroke consultant (1 February 2009 to 30 April 2009). Stroke and transient ischaemic attack services in Lothian, a region of Scotland with a population of 810,000. Delays to assessment at a rapid access transient ischaemic attack and stroke clinic; delays to appropriate treatment. In February 2007 we introduced a 24 hours a day, seven days a week hotline to a consultant, who provided immediate advice on diagnosis, investigation, and emergency treatment for patients with transient ischaemic attack or stroke, and suggested the most appropriate care pathway, which might include an early appointment in a transient ischaemic attack and stroke clinic. The introduction of the hotline was associated with an immediate and sustained reduction in delays to assessment (from 13 to three days) and treatment. The proportion of participants taking statins at the time of visiting the clinic increased from 40% before the introduction of the hotline to 60% after the hotline was in place. Also, the hotline contributed to a reduction in the delay from last event to carotid surgery, from 58 days to 21.5 days. A total of 376 calls were received during the three month audit. Of the 273 (88%) referrers who responded to our questionnaire, 257 (94%) were very satisfied with the advice given over the hotline. Although associated with some disruption to the activities of the consultants, a 24 hours a day, seven days a week telephone hotline to a consultant is a feasible and effective means of reducing delays to specialist assessment and treatment of patients with transient ischaemic attack or stroke.
Appliance of Independent Component Analysis to System Intrusion Analysis
NASA Astrophysics Data System (ADS)
Ishii, Yoshikazu; Takagi, Tarou; Nakai, Kouji
In order to analyze the output of the intrusion detection system and the firewall, we evaluated the applicability of ICA(independent component analysis). We developed a simulator for evaluation of intrusion analysis method. The simulator consists of the network model of an information system, the service model and the vulnerability model of each server, and the action model performed on client and intruder. We applied the ICA for analyzing the audit trail of simulated information system. We report the evaluation result of the ICA on intrusion analysis. In the simulated case, ICA separated two attacks correctly, and related an attack and the abnormalities of the normal application produced under the influence of the attach.
The World Trade Center Attack: Lessons for all aspects of health care
Tamber, Pritpal S; Vincent, Jean-Louis
2001-01-01
The attack on the World Trade Center had the potential to overwhelm New York's health services. Sadly, however, the predicted thousands of treatable patients failed to materialize. Horror and sadness has now been replaced by anger, fear, and the determination to be better prepared next time. This determination not only exists in politics but also in health care, and as with all attempts to enforce change there needs to be a period of collecting opinions and data. This article introduces nine reviews in Critical Care offering varied health care perspectives of the events of 11 September 2001 from people who were there and from experts in disaster management. PMID:11737910
Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks
2007-01-01
Space DoS Denial of Service DSR Dynamic Source Routing IDS Intrusion Detection System LAR Location-Aided Routing MAC Media Access Control MACA Multiple...different mobility parameters. 10 They simulate interaction between three MAC protocols ( MACA , 802.11 and CSMA) and three routing protocols (AODV, DSR
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-16
... asiaticus'' that attacks the vascular system of host plants. Citrus greening greatly reduces production... DEPARTMENT OF AGRICULTURE Animal and Plant Health Inspection Service [Docket No. APHIS-2011-0105... Citrus Psyllid; Quarantine and Interstate Movement Regulations AGENCY: Animal and Plant Health Inspection...
New Careers in Private Industry.
ERIC Educational Resources Information Center
Urban League of Greater New York, NY.
The career-oriented training system discussed at the conference requires (1) visible extra benefits for the new employee beyond the guarantee of a steady job, (2) a highly developed structure of social services designed to attack the unique problems of the newly-employed disadvantaged trainee, (3) specialized training of administrators and…
B.L. Strom; S.R. Clarke; L.M. Roton
2003-01-01
Three major species of Ips bark beetles (Coleoptera: Scolytidae) in the southeastern United States, I. avulsus (Eichoff), I. calligraphus (Germar), and I. grandicollis (Eichoff), attack all species of pines in their range, sometimes causing significant tree mortality (Thatcher, 1960 USDA Forest Service...
Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing
2001-10-01
should be nearly comparable to a system that does not use the payment mechanisms. There is prior work on how pricing can be used to influence consumer ... behavior , how to integrate pricing mechanisms with OS and network resource management mechanisms. In this paper, we instead focus on how pricing
Accountability and Professionalism: A Contradiction in Terms?
ERIC Educational Resources Information Center
Cheng, Ming
2012-01-01
Declining trust in public services has led to increasing calls for higher education to be "accountable" for the quality of its teaching and learning provision. However, increasing levels of quality evaluation have led academics to feel that their professionalism is under attack. Reflecting on this history and various dimensions of…
Navy Virginia (SSN 774) Class Attack Submarine Procurement: Background and Issues for Congress
2016-04-14
programs before the Seapower subcommittee of the Senate Armed Services Committee, the following exchange occurred: SENATOR KELLY AYOTTE (continuing... Bryan Bender, “Navy Eyes Cutting Submarine Force,” Boston Globe, May 12, 2004, p. 1; Lolita C. Baldor, “Study Recommends Cutting Submarine Fleet
75 FR 80735 - Special Conditions: Gulfstream Model GVI Airplane; High Incidence Protection
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-23
..., Aircraft Certification Service, 1601 Lind Avenue, SW., Renton, Washington, 98057-3356; telephone (425) 227... from stalling, limits the angle of attack at which the airplane can be flown during normal low speed... limit impacts the stall speed determination, the stall characteristics, the stall warning demonstration...
76 FR 17022 - Special Conditions: Gulfstream Model GVI Airplane; High Incidence Protection
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... Directorate, Aircraft Certification Service, 1601 Lind Avenue, SW., Renton, Washington 98057-3356; telephone..., limits the angle of attack at which the airplane can be flown during normal low speed operation, and... the stall speed determination, the stall characteristics, the stall warning demonstration, and the...
Verbenone flakes may help slow mountain pine beetle's spread
Nancy (featured scientist) Gillette
2009-01-01
According to "Aerially Applied Verbenone-Releasing Laminated Flakes Protect Pinus contorta Stands from Attack by Dendroctonus ponderosae (mountain pine beetle) in California and Idaho," a US Forest Serviceâfunded study appearing in the February issue of Forest Ecology and Management, not only has the "current...
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks
2013-01-01
high resiliency to malicious attacks and misbehaving nodes. Keywords—trust management; mobile ad hoc networks; QoS trust; social trust; trust...paper we address an importance issue of trust management protocol design for MANETs: trust bias minimization despite misbehaving nodes performing
2007-06-01
MEPS - MIRS Applicant Accession Data Services Applicants Service - MIRS (AF, Navy, CG) Applicant Information (15K DMDC MEPS MCRISS / ARISS QuICR...A000V Army / Marine Corps ARISS / MCRISS Send 4K transmission to MIRS Personal Record Created in MIRS A000V SSN Process Flow 18 Determine SSN...All Clear SSN Process Flow Result Codes M CIAD 20 USMIRS Data Flow Testing 2000 Accession Partners ARISS MCRISS OPM DMDC NDSL ViroMed WinCAT/ (DOS
An Automated Data Fusion Process for an Air Defense Scenario
2011-06-01
and Applications, Proceedings of the IEEE, 77(4)541-580, April of 1989. [4] – Antoniou, G. e Harmelen, F.V. A Semantic Web Primer-Second Edition. The...Instituto Tecnológico de Aeronáutica, São Jose dos Campos, SP, Brazil, 2004. [10] – “What is a Web Service?”, at January, 20, 2011, from http://www.w3...org/TR/ws- arch/#introduction [11] – Yasmine Charif, “An Overview of Semantic Web Services Composition Approaches”, Eletronic Notes in Theorical
2017-12-01
headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the...indoctrination and training that give them the tools to plan, organize, and execute terrorist attacks. These children also have the motive, means, and...Tani Jr. Assistant to the Special Agent in Charge, U.S. Secret Service B.A., University of Mary Washington, 1998 Submitted in partial fulfillment of
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao
2014-09-01
Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.
Corrigan, Malachy; McWilliams, Rita; Kelly, Kerry J.; Niles, Justin; Cammarata, Claire; Jones, Kristina; Wartenberg, Daniel; Hallman, William K.; Kipen, Howard M.; Glass, Lara; Schorr, John K.; Feirstein, Ira
2009-01-01
Objectives. We sought to determine the frequency of psychological symptoms and elevated posttraumatic stress disorder (PTSD) risk among New York City firefighters after the World Trade Center (WTC) attack and whether these measures were associated with Counseling Services Unit (CSU) use or mental health–related medical leave over the first 2.5 years after the attack. Methods. Shortly after the WTC attack, a computerized, binary-response screening questionnaire was administered. Exposure assessment included WTC arrival time and “loss of a co-worker while working at the collapse.” We determined elevated PTSD risk using thresholds derived from Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision, and a sensitivity-specificity analysis. Results. Of 8487 participants, 76% reported at least 1 symptom, 1016 (12%) met criteria for elevated PTSD risk, and 2389 (28%) self-referred to the CSU, a 5-fold increase from before the attack. Higher scores were associated with CSU use, functional job impairment, and mental health–related medical leave. Exposure–response gradients were significant for all outcomes. Conclusions. This screening tool effectively identified elevated PTSD risk, higher CSU use, and functional impairment among firefighters and therefore may be useful in allocating scarce postdisaster mental health resources. PMID:19890176
TimeSet: A computer program that accesses five atomic time services on two continents
NASA Technical Reports Server (NTRS)
Petrakis, P. L.
1993-01-01
TimeSet is a shareware program for accessing digital time services by telephone. At its initial release, it was capable of capturing time signals only from the U.S. Naval Observatory to set a computer's clock. Later the ability to synchronize with the National Institute of Standards and Technology was added. Now, in Version 7.10, TimeSet is able to access three additional telephone time services in Europe - in Sweden, Austria, and Italy - making a total of five official services addressable by the program. A companion program, TimeGen, allows yet another source of telephone time data strings for callers equipped with TimeSet version 7.10. TimeGen synthesizes UTC time data strings in the Naval Observatory's format from an accurately set and maintained DOS computer clock, and transmits them to callers. This allows an unlimited number of 'freelance' time generating stations to be created. Timesetting from TimeGen is made feasible by the advent of Becker's RighTime, a shareware program that learns the drift characteristics of a computer's clock and continuously applies a correction to keep it accurate, and also brings .01 second resolution to the DOS clock. With clock regulation by RighTime and periodic update calls by the TimeGen station to an official time source via TimeSet, TimeGen offers the same degree of accuracy within the resolution of the computer clock as any official atomic time source.
ERIC Educational Resources Information Center
Cibbarelli, Pamela
1996-01-01
Examines library automation product introductions and conversions to new operating systems. Compares user satisfaction ratings of the following library software packages: DOS/Windows, UNIX, Macintosh, and DEC VAX/VMS. Software is rated according to documentation, service/support, training, product reliability, product capabilities, ease of use,…
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muzika, R.M.; Engle, J.; Parks, C.
1993-02-01
Foliage was collected from paired Douglas-fir (Pseudotsuga menziesii) trees characterized as either resistant' or susceptible' to western spruce budworm (Choristoneura occidentalis) (Lepidoptera: Tortricidae) attack. Resistant trees produced more foliage monoterpenes and broke bud 7 to 10 days earlier than susceptible trees.
Getting HBCUs in the Disaster-Response Loop
ERIC Educational Resources Information Center
Colston, Ladd G.
2005-01-01
Natural and man-made disasters represent an ominous threat to the research, instructional and public service missions of colleges and universities. From the bombings in Oklahoma City to the terrorist attacks of Sept. 11 to last year's Hurricane Frances, the potential damage to campus buildings, human life and irreplaceable archival resources is a…
1979-10-01
Although bottlenecks have been discussed thus far in an indus- trial or microeconomic sense, national bottlenecks are possible too, with...Texas Division of Disaster Emergency Services, 1978. JThis workbook provides a detailed format for a multi-meeting workshop to enable local (city/council
2015-09-11
Officials and firefighters at NASA's Kennedy Space Center observe the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
USGS Emergency Response Resources
Bewley, Robert D.
2011-01-01
Every day, emergency responders are confronted with worldwide natural and manmade disasters, including earthquakes, floods, hurricanes, landslides, tsunami, volcanoes, wildfires, terrorist attacks, and accidental oil spills.The U.S. Geological Survey (USGS) is ready to coordinate the provisioning and deployment of USGS staff, equipment, geospatial data, products, and services in support of national emergency response requirements.
Private Schools Put Spotlight on Safety
ERIC Educational Resources Information Center
Zehr, Mary Ann
2005-01-01
Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…
An Update: The Cardiac Wellness Training Project.
ERIC Educational Resources Information Center
Zinn, Lorraine; Long, Patrick
1983-01-01
This article reports on the scope of activities and the effectiveness of a Colorado program that trained community park and recreation personnel to carry out local cardiac wellness services. Participants were trained to provide rehabilitation and fitness activities for those recovering from heart attacks or surgery and for other high-risk persons.…
Public Service, Private Lives.
ERIC Educational Resources Information Center
Sabo, Sandra R.
1993-01-01
Lack of privacy, personal attack, and community controversies are among the job-related problems cited by a number of board members. Suggested survival strategies include the following: do your homework, make no promises, learn to deal with the news media, maintain your equilibrium, and do what is best for the children in the long run. (MLF)
2015-09-11
Firefighters place the American flag at half-staff during dedication services for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. A section of steel I-beam from the World Trade Center in New York forms the centerpiece of the monument.
A CompStat Counterterrorism Strategy to Protect Train and Subway Systems
2008-03-01
other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services , Directorate for...Explosives on the London Underground .........................................54 VI. RECOVERY ...evacuation plan in an effort to aid in the recovery from an attack. This is essential in preventing the terrorists from accomplishing their goals of
A Hands-On Approach for Teaching Denial of Service Attacks: A Case Study
ERIC Educational Resources Information Center
Trabelsi, Zouheir; Ibrahim, Walid
2013-01-01
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Secure, safe, and sensitive solutions.
Hughan, Tina
2012-04-01
Tabloid sensationalism aside, the increase in attacks on health service workers has led to many hospitals and healthcare facilities re-assessing their security systems. Here, Tina Hughan, head of marketing for specialist in door opening systems, Assa Abloy, gives her view on how security providers can help healthcare estates and facilities teams to cope with this disturbing trend.
The Judicial Role in Attacking Racial Discrimination in Tax-exempt Private Schools.
ERIC Educational Resources Information Center
Harvard Law Review, 1979
1979-01-01
Examines the role of the courts in requiring the Internal Revenue Service to fulfill its statutory and constitutional obligations to identify racially discriminatory private schools and to revoke their tax exempt status as charitable organizations. Available from Harvard Law Review Association, Gannett House, Cambridge, MA 02138; sc $5.95. (Author)
Information Security in the 1990s: Keeping the Locks on.
ERIC Educational Resources Information Center
Kovac, Ron J.
1999-01-01
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
NASA Astrophysics Data System (ADS)
Ekedebe, Nnanna; Yu, Wei; Song, Houbing; Lu, Chao
2015-05-01
An intelligent transportation system (ITS) is one typical cyber-physical system (CPS) that aims to provide efficient, effective, reliable, and safe driving experiences with minimal congestion and effective traffic flow management. In order to achieve these goals, various ITS technologies need to work synergistically. Nonetheless, ITS's reliance on wireless connectivity makes it vulnerable to cyber threats. Thus, it is critical to understand the impact of cyber threats on ITS. In this paper, using real-world transportation dataset, we evaluated the consequences of cyber threats - attacks against service availability by jamming the communication channel of ITS. In this way, we can have a better understanding of the importance of ensuring adequate security respecting safety and life-critical ITS applications before full and expensive real-world deployments. Our experimental data shows that cyber threats against service availability could adversely affect traffic efficiency and safety performances evidenced by exacerbated travel time, fuel consumed, and other evaluated performance metrics as the communication network is compromised. Finally, we discuss a framework to make ITS secure and more resilient against cyber threats.
An Online Change of Activity in Energy Spectrum for Detection on an Early Intervention Robot
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boudergui, K.; Laine, F.; Montagu, T.
With the growth of industrial risks and the multiplication of CBRNe (Chemical Biological Radiological and explosive) attacks through toxic chemicals, biological or radiological threats, public services and military authorities face with increasingly critical situations, whose management is strongly conditioned by fast and reliable establishment of an informative diagnostic. Right after an attack, the five first minutes are crucial to define the various scenarios and the most dangerous for a human intervention. Therefore the use of robots is considered essential by all stakeholders of security. In this context, the SISPEO project (Systeme d'Intervention Sapeurs Pompiers Robotise) aims to create/build/design a robustmore » response through a robotic platform for early intervention services such as civil and military security in hostile environments. CEA LIST has proposed an adapted solution to detect and characterize nuclear and radiological risks online and in motion, using a miniature embedded CdZnTe (CZT) crystal Gamma-ray spectrometer. This paper presents experimental results for this miniature embedded CZT spectrometer and its associated mathematical method to detect and characterize radiological threats online and in motion. (authors)« less
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
Vestibular evoked myogenic potential (VEMP) in patients with Ménière's disease with drop attacks.
Timmer, Ferdinand C A; Zhou, Guangwei; Guinan, John J; Kujawa, Sharon G; Herrmann, Barbara S; Rauch, Steven D
2006-05-01
In this retrospective study, we tested the hypothesis that vestibular evoked myogenic potential (VEMP) thresholds are more often elevated or absent in patients with Ménière's disease experiencing Tumarkin drop attacks than in other patients with Ménière's disease. Subjects included normal subjects (n = 14) and patients with unilateral Ménière's disease by AAO-HNS (1995) diagnostic criteria with (n = 12) and without (n = 82) Tumarkin drop attacks at a large specialty hospital otology service. VEMP threshold testing was conducted using 250, 500, and 1,000 Hz tone burst stimuli. VEMP responses were present in at all frequencies in both ears of all normal subjects. In unaffected ears of patients with unilateral Ménière's disease, VEMPs were undetectable in 13% of measurements attempted. This number rose to 18% in affected ears of patients with unilateral Ménière's disease and to 41% in Meniere ears with Tumarkin drop attacks. Frequency tuning of the VEMP response in normal subjects showed lowest thresholds at 500 Hz. In Meniere ears, the tuning was altered such that the 500-Hz thresholds were higher than the 1,000-Hz thresholds. There was a gradient of threshold elevation and altered tuning that corresponded to the gradient of worsening disease. Our findings support the hypothesis that Tumarkin drop attacks arise from advanced disease involving the saccule and that VEMP may be a clinically valuable metric of disease severity or progression in patients with Ménière's disease.
Kahan, Ernesto; Fogelman, Yacov; Kitai, Eliezer; Vinker, Shlomo
2003-08-01
The threat of bioterrorism consequent to the September 11, 2001 attack in the USA generated suggestions for improved medical response mainly through hospital preparedness. The aim of the present study was to investigate the impact of this period of tension on patients' first choice for care and for receiving relevant information, and on primary care doctors' feelings of responsibility in the eventuality of an anthrax attack. During October 11-31, 2001, 500 patients from 30 clinics throughout Israel were asked to complete a questionnaire on their awareness of the anthrax threat, measures taken to prepare for it, and preferred sources of care and information. Their 30 physicians, and an additional 20, completed a questionnaire on knowledge about anthrax and anthrax-related patient behaviours and clinic visits. The outstanding finding was the low rate (30%) of patients who chose the hospital emergency department as their first choice for care or information if they were worried about an anthrax attack or the media communicated that an attack was in progress. The other two-thirds preferred their family doctor or the health authorities. Most of the physicians (89%) felt it was their responsibility to treat anthrax-infected patients and that they should therefore be supplied with appropriate guidelines. This study suggests that in Israel, a country with a high degree of awareness of civil defence aspects, both patients and primary care doctors believe that family physicians should have a major role in the case of bioterrorist attacks. This must be seriously considered during formulation of relevant health services programmes.
Socioeconomic determinants of access to health services among older adults: a systematic review.
Almeida, Ana Paula Santana Coelho; Nunes, Bruno Pereira; Duro, Suele Manjourany Silva; Facchini, Luiz Augusto
2017-05-15
The objective of this study was to analyze the association between the socioeconomic characteristics and the access to or use of health services among older adults. This is a systematic review of the literature. The search has been carried out in the databases PubMed, LILACS and Web of Science, without restriction of dates and languages; however we have included only articles published in Portuguese, English, and Spanish. The inclusion criteria were: observational design, socioeconomic factors as variables of interest in the analysis of the access to or use of health services among older adults, representative sample of the target population, adjustment for confounding factors, and no selection bias. We have found 5,096 articles after deleting duplicates and 36 of them have been selected for review after the process of reading and evaluating the inclusion criteria. Higher income and education have been associated with the use and access to medical appointments in developing countries and some developed countries. The same association has been observed in dental appointments in all countries. Most studies have shown no association between socioeconomic characteristics and the use of inpatient and emergency services. We have identified greater use of home visits in lower-income individuals, with the exception of the United States. We have observed an unequal access to or use of health services in most countries, varying according to the type of service used. The expansion of the health care coverage is necessary to reduce this unequal access generated by social inequities. Analisar a associação entre características socioeconômicas e acesso ou utilização de serviços de saúde entre idosos. Revisão sistemática da literatura. A busca foi realizada nas bases de dados PubMed, Lilacs e Web of Science, sem restrição de datas e idiomas, entretanto foram incluídos somente os artigos publicados em português, inglês e espanhol. Foram critérios de inclusão: ter delineamento observacional; possuir os fatores socioeconômicos como variáveis de interesse na análise do acesso ou utilização de serviços de saúde entre idosos; ter amostra representativa da população alvo; fazer ajuste para fatores de confusão; e não apresentar viés de seleção. Foram encontrados 5.096 artigos após a exclusão de duplicidades e 36 foram selecionados para a revisão após o processo de leitura e avaliação dos critérios de inclusão. Maior renda e escolaridade estiveram associadas à utilização e acesso a consultas médicas nos países em desenvolvimento e em alguns países desenvolvidos. A mesma associação foi observada nas consultas odontológicas em todos os países. A maioria dos estudos não apresentou associação entre características socioeconômicas e uso de serviços de internação e emergência. Foi identificado maior uso de visita domiciliar em indivíduos de menor renda, com exceção dos Estados Unidos. Observou-se desigualdade no acesso ou na utilização de serviços de saúde na maior parte dos países, variando em relação ao tipo de serviço utilizado. A ampliação da cobertura de serviços de saúde faz-se necessária para a redução da desigualdade no acesso gerada por iniquidades sociais.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Hsien-Hsin S
The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less
Protecting Sensitive Information in Directory Services Using Virtual Directories
NASA Astrophysics Data System (ADS)
Claycomb, William; Shin, Dongwan
Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.
Kelly, Peter J; Albers, Gregory W; Chatzikonstantinou, Anastasios; De Marchis, Gian Marco; Ferrari, Julia; George, Paul; Katan, Mira; Knoflach, Michael; Kim, Jong S; Li, Linxin; Lee, Eun-Jae; Olivot, Jean-Marc; Purroy, Francisco; Raposo, Nicolas; Rothwell, Peter M; Sharma, Vijay K; Song, Bo; Tsivgoulis, Georgios; Walsh, Cathal; Xu, Yuming; Merwick, Aine
2016-11-01
Identification of patients at highest risk of early stroke after transient ischaemic attack has been improved with imaging based scores. We aimed to compare the validity and prognostic utility of imaging-based stroke risk scores in patients after transient ischaemic attack. We did a pooled analysis of published and unpublished individual-patient data from 16 cohort studies of transient ischaemic attack done in Asia, Europe, and the USA, with early brain and vascular imaging and follow up. All patients were assessed by stroke specialists in hospital settings as inpatients, in emergency departments, or in transient ischaemic attack clinics. Inclusion criteria were stroke-specialist confirmed transient ischaemic attack, age of 18 years or older, and MRI done within 7 days of index transient ischaemic attack and before stroke recurrence. Multivariable logistic regression was done to analyse the predictive utility of abnormal diffusion-weighted MRI, carotid stenosis, and transient ischaemic attack within 1 week of index transient ischaemic attack (dual transient ischaemic attack) after adjusting for ABCD2 score. We compared the prognostic utility of the ABCD2, ABCD2-I, and ABCD3-I scores using discrimination, calibration, and risk reclassification. In 2176 patients from 16 cohort studies done between 2005 and 2015, after adjusting for ABCD2 score, positive diffusion-weighted imaging (odds ratio [OR] 3·8, 95% CI 2·1-7·0), dual transient ischaemic attack (OR 3·3, 95% CI 1·8-5·8), and ipsilateral carotid stenosis (OR 4·7, 95% CI 2·6-8·6) were associated with 7 day stroke after index transient ischaemic attack (p<0·001 for all). 7 day stroke risk increased with increasing ABCD2-I and ABCD3-I scores (both p<0·001). Discrimination to identify early stroke risk was improved for ABCD2-I versus ABCD2 (2 day c statistic 0·74 vs 0·64; p=0·006). However, discrimination was further improved by ABCD3-I compared with ABCD2 (2 day c statistic 0·84 vs 0·64; p<0·001) and ABCD2-I (c statistic 0·84 vs 0·74; p<0·001). Early stroke risk reclassification was improved by ABCD3-I compared with ABCD2-I score (clinical net reclassification improvement 33% at 2 days). Although ABCD2-I and ABCD3-I showed validity, the ABCD3-I score reliably identified highest-risk patients at highest risk of a stroke after transient ischaemic attack with improved risk prediction compared with ABCD2-I. Transient ischaemic attack management guided by ABCD3-I with immediate stroke-specialist assessment, urgent MRI, and vascular imaging should now be considered, with monitoring of safety and cost-effectiveness. Health Research Board of Ireland, Irish Heart Foundation, Irish Health Service Executive, Irish National Lottery, National Medical Research Council of Singapore, Swiss National Science Foundation, Bangerter-Rhyner Foundation, Swiss National Science Foundation, Swisslife Jubiläumsstiftung for Medical Research, Swiss Neurological Society, Fondazione Dr Ettore Balli (Switzerland), Clinical Trial Unit of University of Bern, South Korea's Ministry for Health, Welfare, and Family Affairs, UK Wellcome Trust, Wolfson Foundation, UK Stroke Association, British Heart Foundation, Dunhill Medical Trust, National Institute of Health Research (NIHR), Medical Research Council, and the NIHR Oxford Biomedical Research Centre. Copyright © 2016 Elsevier Ltd. All rights reserved.
A remote data access architecture for home-monitoring health-care applications.
Lin, Chao-Hung; Young, Shuenn-Tsong; Kuo, Te-Son
2007-03-01
With the aging of the population and the increasing patient preference for receiving care in their own homes, remote home care is one of the fastest growing areas of health care in Taiwan and many other countries. Many remote home-monitoring applications have been developed and implemented to enable both formal and informal caregivers to have remote access to patient data so that they can respond instantly to any abnormalities of in-home patients. The aim of this technology is to give both patients and relatives better control of the health care, reduce the burden on informal caregivers and reduce visits to hospitals and thus result in a better quality of life for both the patient and his/her family. To facilitate their widespread adoption, remote home-monitoring systems take advantage of the low-cost features and popularity of the Internet and PCs, but are inherently exposed to several security risks, such as virus and denial-of-service (DoS) attacks. These security threats exist as long as the in-home PC is directly accessible by remote-monitoring users over the Internet. The purpose of the study reported in this paper was to improve the security of such systems, with the proposed architecture aimed at increasing the system availability and confidentiality of patient information. A broker server is introduced between the remote-monitoring devices and the in-home PCs. This topology removes direct access to the in-home PC, and a firewall can be configured to deny all inbound connections while the remote home-monitoring application is operating. This architecture helps to transfer the security risks from the in-home PC to the managed broker server, on which more advanced security measures can be implemented. The pros and cons of this novel architecture design are also discussed and summarized.
Blind quantum computation with identity authentication
NASA Astrophysics Data System (ADS)
Li, Qin; Li, Zhulin; Chan, Wai Hong; Zhang, Shengyu; Liu, Chengdong
2018-04-01
Blind quantum computation (BQC) allows a client with relatively few quantum resources or poor quantum technologies to delegate his computational problem to a quantum server such that the client's input, output, and algorithm are kept private. However, all existing BQC protocols focus on correctness verification of quantum computation but neglect authentication of participants' identity which probably leads to man-in-the-middle attacks or denial-of-service attacks. In this work, we use quantum identification to overcome such two kinds of attack for BQC, which will be called QI-BQC. We propose two QI-BQC protocols based on a typical single-server BQC protocol and a double-server BQC protocol. The two protocols can ensure both data integrity and mutual identification between participants with the help of a third trusted party (TTP). In addition, an unjammable public channel between a client and a server which is indispensable in previous BQC protocols is unnecessary, although it is required between TTP and each participant at some instant. Furthermore, the method to achieve identity verification in the presented protocols is general and it can be applied to other similar BQC protocols.
Comer, Jonathan S.; Fan, Bin; Duarte, Cristiane S.; Wu, Ping; Musa, George J.; Mandell, Donald J.; Albano, Anne Marie; Hoven, Christina W.
2014-01-01
In the aftermath of disasters, understanding relationships between disaster-related life disruption and children’s functioning is key to informing future postdisaster intervention efforts. The present study examined attack-related life disruptions and psychopathology in a representative sample (N = 8,236) of New York City public schoolchildren (Grades 4–12) surveyed 6 months after September 11, 2001. One in 5 youth reported a family member lost their job because of the attacks, and 1 in 3 reported their parents restricted their postattack travel. These forms of disruption were, in turn, associated with elevated rates of probable posttraumatic stress disorder and other anxiety disorders (and major depressive disorder in the case of restricted travel). Results indicate that adverse disaster-related experiences extend beyond traumatic exposure and include the prolonged ripple of postdisaster life disruption and economic hardship. Future postdisaster efforts must, in addition to ensuring the availability of mental health services for proximally exposed youth, maintain a focus on youth burdened by disaster-related life disruption. PMID:20589558
Are cattle dangerous to walkers? A scoping review.
Fraser-Williams, Angharad P; McIntyre, K Marie; Westgarth, Carri
2016-12-01
Anecdotal evidence suggests that people coming into contact with cattle while participating in outdoor pursuits can sustain severe, even fatal injuries. This has negative implications for farmers, cattle and the public. This study outlines findings from a review of published literature, UK media reports and internet guidelines currently available to the UK public for walking near cattle. A total of 54 cattle attacks were reported in the UK media from 1 January 1993 to 31 May 2013; approximately one-quarter resulted in fatality and two-thirds involved dogs. Walking with dogs among cows, particularly with calves present, was a problematic context. Twenty pieces of commonly occurring advice were found within various guidelines. However, there are no definitive approved guidelines, no published studies describing the prevalence of cattle attacks on members of the public and no system in place to document them. Attacks by cattle are underinvestigated and further work should assess their public health impact. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.
Lessons learned from the New York State mental health response to the September 11, 2001, attacks.
Sederer, Lloyd I; Lanzara, Carol B; Essock, Susan M; Donahue, Sheila A; Stone, James L; Galea, Sandro
2011-09-01
In the aftermath of the September 11, 2001, attacks on the World Trade Center, the public mental health system in New York City mounted the largest mental health disaster response in history, called Project Liberty. The successes and challenges of Project Liberty are evaluated. The development of Project Liberty is summarized and analyzed from the perspective of the New York State and New York City officials and scientists who led the disaster response. Lessons learned that have implications for mental health support in future disaster responses are offered. A high level of interagency collaboration, engagement of nongovernmental organizations to provide services, media education efforts, and ongoing program evaluation all contributed to the program's successes. Mental health professionals' limited experiences with trauma, options for funding treatment, duration of clinical program, and existing needs assessments methodologies all proved challenging. Project Liberty was a massive and invaluable resource during the years of rebuilding in New York City in the wake of the attacks. Challenges faced have led to lessons of generalizable import for other mental health responses to large-scale events.
2014-01-01
Background Evidence indicates that asthma attacks can be triggered by exposure to ambient air pollutants, however, detailed pollution information is missing from asthma action plans. Asthma is commonly associated with four criteria pollutants with standards derived by the United States Environmental Protection Agency. Since multiple pollutants trigger attacks and risks depend upon city-specific mixtures of pollutants, there is lack of specific guidance to reduce exposure. Until multi-pollutant statistical modeling fully addresses this gap, some guidance on pollutant attack risk is required. This study examines the risks from exposure to the asthma-related pollutants in a large metropolitan city and defines the city-specific association between attacks and pollutant mixtures. Our goal is that city-specific pollution risks be incorporated into individual asthma action plans as additional guidance to prevent attacks. Methods Case-crossover analysis and conditional logistic regression were used to measure the association between ozone, fine particulate matter, nitrogen dioxide, sulfur dioxide and carbon monoxide pollution and 11,754 emergency medical service ambulance treated asthma attacks in Houston, Texas from 2004-2011. Both single and multi-pollutant models are presented. Results In Houston, ozone and nitrogen dioxide are important triggers (RR = 1.05; 95% CI: 1.00, 1.09), (RR = 1.10; 95% CI: 1.05, 1.15) with 20 and 8 ppb increase in ozone and nitrogen dioxide, respectively, in a multi-pollutant model. Both pollutants are simultaneously high at certain times of the year. The risk attributed to these pollutants differs when they are considered together, especially as concentrations increase. Cumulative exposure for ozone (0-2 day lag) is of concern, whereas for nitrogen dioxide the concern is with single day exposure. Persons at highest risk are aged 46-66, African Americans, and males. Conclusions Accounting for cumulative and concomitant outdoor pollutant exposure is important to effectively attribute risk for triggering of an asthma attack, especially as concentrations increase. Improved asthma action plans for Houston individuals should warn of these pollutants, their trends, correlation and cumulative effects. Our Houston based study identifies nitrogen dioxide levels and the three-day exposure to ozone to be of concern whereas current single pollutant based national standards do not. PMID:25012280
Pizzol, Damiano; Di Gennaro, Francesco; Boscardin, Chiara; Putoto, Giovanni; Cuppini, Elena; Pita, Graciana; George, Alexandra; Monno, Laura; Saracino, Annalisa; Da Dalt, Liviana; De Palma, Angela
2018-03-01
The purpose of this article is to provide insights into the demand for pregnancy-related health services by adolescent girls and young women in Mozambique. We analysed the patient registers for the first year of operation (2014) of the Servicios Amigos dos Adolescentes (SAAJ) [Friendly Services for Adolescents] clinics in Beira, Mozambique. These registers provide details of the service demands of, and services provided to the 8 290 adolescent girls and young women who accessed the 6 SAAJ clinics in 2014. Analysis of that record, with disaggregation of the patients according to age (9 years or less; 10-14; 15-19; 20-24; 25 and older), show that 3 021 (36%) were pregnant or had previously been pregnant; most being girls in the 15-19 age band (59%). Being pregnant or having been pregnant previously was associated with dropping out of school. Of all the girls and women, 60% agreed to HIV testing and counselling; the HIV prevalence rate amongst this group was 4-5% amongst adolescents and 25% amongst women 25 years and older. A minority of the girls and women who were pregnant or had been pregnant previously agreed to HIV testing and counselling. Notwithstanding the limitations for analysis, the results were alarming: substantially high HIV prevalence rates were indicated (2% amongst 10-14 year old girls; 8% amongst 15-19 year olds; 10% amongst 20-24 year olds; and 28% amongst >24 year olds). The data from the SAAJ clinics and results pertain only to conditions in Beira. However, as the first empirical assessment of pregnancy-related service demand amongst adolescent girls and young women in the country and involving a relatively large sample, we contend that this study affirms the need for expansion of sexual and reproductive health (SRH) services, including HIV services, for adolescent girls and young women in Mozambique.
North, Carol S.; Pollio, David E.; Smith, Rebecca P.; King, Richard V.; Pandya, Anand; Surís, Alina M.; Hong, Barry A.; Dean, Denis J.; Wallace, Nancy E.; Herman, Daniel B.; Conover, Sarah; Susser, Ezra; Pfefferbaum, Betty
2013-01-01
Objective Several studies have provided prevalence estimates of posttraumatic stress disorder (PTSD) related to the September 11, 2001 (9/11) attacks in broadly affected populations, although without sufficiently addressing qualifying exposures required for assessing PTSD and estimating its prevalence. A premise that people throughout the New York City area were exposed to the attacks on the World Trade Center (WTC) towers and are thus at risk for developing PTSD has important implications for both prevalence estimates and service provision. This premise has not, however, been tested with respect to DSM-IV-TR criteria for PTSD. This study examined associations between geographic distance from the 9/11 attacks on the WTC and reported 9/11 trauma exposures, and the role of specific trauma exposures in the development of PTSD. Methods Approximately 3 years after the attacks, 379 surviving employees (102 with direct exposures, including 65 in the towers, and 277 with varied exposures) recruited from 8 affected organizations were interviewed using the Diagnostic Interview Schedule/Disaster Supplement and reassessed at 6 years. The estimated closest geographic distance from the WTC towers during the attacks and specific disaster exposures were compared with the development of 9/11–related PTSD as defined by the Diagnostic and Statistical Manual, Fourth Edition, Text Revision. Results The direct exposure zone was largely concentrated within a radius of 0.1 mi and completely contained within 0.75 mi of the towers. PTSD symptom criteria at any time after the disaster were met by 35% of people directly exposed to danger, 20% of those exposed only through witnessed experiences, and 35% of those exposed only through a close associate’s direct exposure. Outside these exposure groups, few possible sources of exposure were evident among the few who were symptomatic, most of whom had preexisting psychiatric illness. Conclusions Exposures deserve careful consideration among widely affected populations after large terrorist attacks when conducting clinical assessments, estimating the magnitude of population PTSD burdens, and projecting needs for specific mental health interventions. PMID:21900416
North, Carol S; Pollio, David E; Smith, Rebecca P; King, Richard V; Pandya, Anand; Surís, Alina M; Hong, Barry A; Dean, Denis J; Wallace, Nancy E; Herman, Daniel B; Conover, Sarah; Susser, Ezra; Pfefferbaum, Betty
2011-09-01
Several studies have provided prevalence estimates of posttraumatic stress disorder (PTSD) related to the September 11, 2001 (9/11) attacks in broadly affected populations, although without sufficiently addressing qualifying exposures required for assessing PTSD and estimating its prevalence. A premise that people throughout the New York City area were exposed to the attacks on the World Trade Center (WTC) towers and are thus at risk for developing PTSD has important implications for both prevalence estimates and service provision. This premise has not, however, been tested with respect to DSM-IV-TR criteria for PTSD. This study examined associations between geographic distance from the 9/11 attacks on the WTC and reported 9/11 trauma exposures, and the role of specific trauma exposures in the development of PTSD. Approximately 3 years after the attacks, 379 surviving employees (102 with direct exposures, including 65 in the towers, and 277 with varied exposures) recruited from 8 affected organizations were interviewed using the Diagnostic Interview Schedule/Disaster Supplement and reassessed at 6 years. The estimated closest geographic distance from the WTC towers during the attacks and specific disaster exposures were compared with the development of 9/11-related PTSD as defined by the Diagnostic and Statistical Manual, Fourth Edition, Text Revision. The direct exposure zone was largely concentrated within a radius of 0.1 mi and completely contained within 0.75 mi of the towers. PTSD symptom criteria at any time after the disaster were met by 35% of people directly exposed to danger, 20% of those exposed only through witnessed experiences, and 35% of those exposed only through a close associate's direct exposure. Outside these exposure groups, few possible sources of exposure were evident among the few who were symptomatic, most of whom had preexisting psychiatric illness. Exposures deserve careful consideration among widely affected populations after large terrorist attacks when conducting clinical assessments, estimating the magnitude of population PTSD burdens, and projecting needs for specific mental health interventions.
Downhole fiber optic sensing: the oilfield service provider's perspective
NASA Astrophysics Data System (ADS)
Skinner, Neal G.; Maida, John L., Jr.
2004-12-01
There is increasing interest in the petroleum industry in the application of fiber-optic sensing techniques. In this paper, we review which sensing technologies are being adopted downhole and the drivers for this deployment. We describe the performance expectations (accuracy, resolution, stability and operational lifetime) that the oil companies and the oil service companies have for fiber-optic sensing systems. We also describe the environmental conditions (high hydrostatic pressures, high temperatures, shock, vibration, crush, and chemical attack) that these systems must tolerate in order to provide reliable and economically attractive reservoir-performance monitoring solutions.
2011-05-01
communications and on computer networks—its Global Information Grid—which are potentially jeopardized by the millions of denial-of-service attacks, hacking ...Director,a National Security Agency Chief of Staff Joint Operations Center Defense Information Systems Agency Command Center J1 J2 J3 J4 J5 J6 J7 J8...DC Joint Staff • J39, Operations, Pentagon, Washington, DC • J5 , Strategic Plans and Policy, Pentagon, Washington, DC U.S. Strategic Command • J882
Barbier, Olivier; Malgras, Brice; Choufani, Camille; Bouchard, Antoine; Ollat, Didier; Versier, Gilbert
2017-06-01
Recent conflicts have allowed the French Army Health Service to improve management quality for wartime-injured people during military operations. On November 13, 2015, it was in Paris that France was directly attacked and Bégin Military Teaching Hospital, like several hospitals in Paris, had to face a large number of gunshot victims. Thanks to our operational experience, injured people hospitalized in military hospitals benefited from a management based on triage and damage control (DC) principles. Forty-five patients were taken care of in our hospital with an average age of 32 years. During triage, eight patients were categorized T1 (with four extreme emergencies) and 10 were classified T2 and 27 as T3. Twenty-two patients underwent emergency surgery, 15 for soft tissue lesions of limbs, 8 for ballistic fractures (one of which was a cervical wound), and 5 for abdominal wounds. Two patients classified T1 died early. In total, more than 50 operations were performed including iterative debridements, bone fixation, three amputations, and two flaps. After 9 months, all of the patients had healed. One woman with limb stiffness required an arthrolysis. This event showed that terrorist attacks and mass casualties with war wounds can occur in France. Acquired experience regarding war wounds by the French Army Health Service is precious. Everyone must understand the importance of triage and the principles of damage control. Every hospital must be ready to face this type of massive influx of injured people (white plan). Epidemiological study, level V.
The evil circle of poverty: a qualitative study of malaria and disability
2012-01-01
Background This article discusses the link between disability and malaria in a poor rural setting. Global malaria programmes and rehabilitation programmes are organized as vertical and separate programmes, and as such they focus on prevention, cure and control, and disability respectively. When looking at specific conditions and illnesses, the impairing long-term consequences of illness incidents during childhood are not questioned. Methods The study design was ethnographic with an open, exploratory approach. Data were collected in Mangochi District in Malawi through qualitative in-depth interviews and participant observation. Results Despite a local-based health service system, people living in poor rural areas are confronted with a multitude of barriers when accessing malaria prevention and treatment. Lack of skilled health personnel and equipment add to the general burden of poverty: insufficient knowledge about health care, problems connected to accessing the health facility in time, insufficient initiatives to prevent malaria attacks, and a general lack of attention to the long term disabling effects of a malaria attack. Conclusions This study points to the importance of building malaria programmes, research and statistics that take into consideration the consequences of permanent impairment after a malaria attack, as well as the context of poverty in which they often occur. In order to do so, one needs to develop methods for detecting people whose disabilities are a direct result of not having received health services after a malaria episode. This may be done through qualitative approaches in local communities and should also be supplemented by suitable surveys in order to estimate the problem on a larger scale. PMID:22236358
The evil circle of poverty: a qualitative study of malaria and disability.
Ingstad, Benedicte; Munthali, Alister C; Braathen, Stine H; Grut, Lisbet
2012-01-11
This article discusses the link between disability and malaria in a poor rural setting. Global malaria programmes and rehabilitation programmes are organized as vertical and separate programmes, and as such they focus on prevention, cure and control, and disability respectively. When looking at specific conditions and illnesses, the impairing long-term consequences of illness incidents during childhood are not questioned. The study design was ethnographic with an open, exploratory approach. Data were collected in Mangochi District in Malawi through qualitative in-depth interviews and participant observation. Despite a local-based health service system, people living in poor rural areas are confronted with a multitude of barriers when accessing malaria prevention and treatment. Lack of skilled health personnel and equipment add to the general burden of poverty: insufficient knowledge about health care, problems connected to accessing the health facility in time, insufficient initiatives to prevent malaria attacks, and a general lack of attention to the long term disabling effects of a malaria attack. This study points to the importance of building malaria programmes, research and statistics that take into consideration the consequences of permanent impairment after a malaria attack, as well as the context of poverty in which they often occur. In order to do so, one needs to develop methods for detecting people whose disabilities are a direct result of not having received health services after a malaria episode. This may be done through qualitative approaches in local communities and should also be supplemented by suitable surveys in order to estimate the problem on a larger scale. © 2012 Ingstad et al; licensee BioMed Central Ltd.
Mortality, mauling, and maiming by vicious dogs.
Bini, John K; Cohn, Stephen M; Acosta, Shirley M; McFarland, Marilyn J; Muir, Mark T; Michalek, Joel E
2011-04-01
Maiming and death due to dog bites are uncommon but preventable tragedies. We postulated that patients admitted to a level I trauma center with dog bites would have severe injuries and that the gravest injuries would be those caused by pit bulls. We reviewed the medical records of patients admitted to our level I trauma center with dog bites during a 15-year period. We determined the demographic characteristics of the patients, their outcomes, and the breed and characteristics of the dogs that caused the injuries. Our Trauma and Emergency Surgery Services treated 228 patients with dog bite injuries; for 82 of those patients, the breed of dog involved was recorded (29 were injured by pit bulls). Compared with attacks by other breeds of dogs, attacks by pit bulls were associated with a higher median Injury Severity Scale score (4 vs. 1; P = 0.002), a higher risk of an admission Glasgow Coma Scale score of 8 or lower (17.2% vs. 0%; P = 0.006), higher median hospital charges ($10,500 vs. $7200; P = 0.003), and a higher risk of death (10.3% vs. 0%; P = 0.041). Attacks by pit bulls are associated with higher morbidity rates, higher hospital charges, and a higher risk of death than are attacks by other breeds of dogs. Strict regulation of pit bulls may substantially reduce the US mortality rates related to dog bites.
Competition in the domain of wireless networks security
NASA Astrophysics Data System (ADS)
Bednarczyk, Mariusz
2017-04-01
Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.
Zhang, Liping; Zhu, Shaohui; Tang, Shanyu
2017-03-01
Telecare medicine information systems (TMIS) provide flexible and convenient e-health care. However, the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data. Recently, Mishra et al. proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.'s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate that Mishra et al.'s scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses of Mishra et al.'s scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient to enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Morris, Jonathan R; Vandermeer, John; Perfecto, Ivette
2015-01-01
Species' functional traits are an important part of the ecological complexity that determines the provisioning of ecosystem services. In biological pest control, predator response to pest density variation is a dynamic trait that impacts the provision of this service in agroecosystems. When pest populations fluctuate, farmers relying on biocontrol services need to know how natural enemies respond to these changes. Here we test the effect of variation in coffee berry borer (CBB) density on the biocontrol efficiency of a keystone ant species (Azteca sericeasur) in a coffee agroecosystem. We performed exclosure experiments to measure the infestation rate of CBB released on coffee branches in the presence and absence of ants at four different CBB density levels. We measured infestation rate as the number of CBB bored into fruits after 24 hours, quantified biocontrol efficiency (BCE) as the proportion of infesting CBB removed by ants, and estimated functional response from ant attack rates, measured as the difference in CBB infestation between branches. Infestation rates of CBB on branches with ants were significantly lower (71%-82%) than on those without ants across all density levels. Additionally, biocontrol efficiency was generally high and did not significantly vary across pest density treatments. Furthermore, ant attack rates increased linearly with increasing CBB density, suggesting a Type I functional response. These results demonstrate that ants can provide robust biological control of CBB, despite variation in pest density, and that the response of predators to pest density variation is an important factor in the provision of biocontrol services. Considering how natural enemies respond to changes in pest densities will allow for more accurate biocontrol predictions and better-informed management of this ecosystem service in agroecosystems.
Morris, Jonathan R.; Vandermeer, John; Perfecto, Ivette
2015-01-01
Species’ functional traits are an important part of the ecological complexity that determines the provisioning of ecosystem services. In biological pest control, predator response to pest density variation is a dynamic trait that impacts the provision of this service in agroecosystems. When pest populations fluctuate, farmers relying on biocontrol services need to know how natural enemies respond to these changes. Here we test the effect of variation in coffee berry borer (CBB) density on the biocontrol efficiency of a keystone ant species (Azteca sericeasur) in a coffee agroecosystem. We performed exclosure experiments to measure the infestation rate of CBB released on coffee branches in the presence and absence of ants at four different CBB density levels. We measured infestation rate as the number of CBB bored into fruits after 24 hours, quantified biocontrol efficiency (BCE) as the proportion of infesting CBB removed by ants, and estimated functional response from ant attack rates, measured as the difference in CBB infestation between branches. Infestation rates of CBB on branches with ants were significantly lower (71%-82%) than on those without ants across all density levels. Additionally, biocontrol efficiency was generally high and did not significantly vary across pest density treatments. Furthermore, ant attack rates increased linearly with increasing CBB density, suggesting a Type I functional response. These results demonstrate that ants can provide robust biological control of CBB, despite variation in pest density, and that the response of predators to pest density variation is an important factor in the provision of biocontrol services. Considering how natural enemies respond to changes in pest densities will allow for more accurate biocontrol predictions and better-informed management of this ecosystem service in agroecosystems. PMID:26562676
Das, Ashok Kumar
2015-03-01
Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.
The K-12 Hardware Industry: A Heated Race that Shows No Sign of Letting Up.
ERIC Educational Resources Information Center
McCarthy, Robert
1989-01-01
This overview of the computer industry vendors that supply microcomputer hardware to educators for use in kindergarten through high school focuses on Apple, Tandy, Commodore, and IBM. The use of MS-DOS versus the operating system used in Apple computers is discussed, and pricing and service issues are raised. (LRW)
Fire Fighters’ Ability and Willingness to Participate in a Pandemic
2008-03-01
Death Associated with Moderate and Severe Pandemic Influenza Scenarios* .........61 Table 13. Vaccine Priority Group Recommendations...Department of Heath and Human Services’ Pandemic Influenza Plan calculates plans for a clinical attack rate (the rate at which the disease will...occurs. 4 U.S. Department of Health and Human Services (DHHS), HHS Pandemic Influenza Plan
Campus Attacks: Targeted Violence Affecting Institutions of Higher Education
ERIC Educational Resources Information Center
Drysdale, Diana A.; Modzeleski, William; Simons, Andre B.
2010-01-01
On the third anniversary of the tragic shooting at Virginia Tech, the U.S. Secret Service, the U.S. Department of Education and the Federal Bureau of Investigation released this study of targeted violence incidents on U.S. campuses of higher learning. The three entities wanted to know how the prevalence of the incidents of targeted violence affect…
Cyberwarfare and Operational Art
2017-05-25
Electronic Attack EMS Electro Magnetic Spectrum FM Field Manual FSB Federal Security Service (Russian Federation) GAO General Accounting Office GRU...Warfare, (Cambridge, MA: O’Reilly Media Inc., 2012), 74. 2 "The Bombe developed in Bletchley by Turing and Welshman and Babbage - all luminaries of...cyberspace domain’s fundamental characteristics. First, cyberspace requires the Electro Magnetic Spectrum ( EMS ) to propagate efficiently. Second
A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.
ERIC Educational Resources Information Center
Lee, M. C.; Fung, Chun-Kan
2003-01-01
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
1992-07-01
plant must also be examined for herbivores attacking the weed. This ensures that time and money are not wasted by importing insects already present in...Agricultural Research Service Aquatic Weed Research Laboratory in Fort Lauder - dale, FL, from quarantine tacilities in Gainesville, FL, on 11 February
In the Service of Empire: Imperialism and the British Spy Thriller, 1901-1914
2010-06-01
against British rule, perhaps as a prelude to a more serious attack through Afghanistan. Although the British had managed to crush the Indian... waiters , and bar- bers. In detailing the German hidden hand, le Queux was ada- mant that his novel was based on “serious facts,” unearthed over a 12
2015-09-11
An honor guard folds an American flag during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
Kelvin Manning, associate director of NASA's Kennedy Space Center, speaks during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
An honor guard prepares to fold an American flag during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The honor guard for the Fire Department at NASA's Kennedy Space Center conducts the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at Kennedy on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The Brevard Police and Fire Pipe and Drum corps open the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
2015-09-11
The Brevard Police and Fire Pipe and Drum corps perform during the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Fire Station 1 at NASA's Kennedy Space Center on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Preventing Catastrophes from Data Loss
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
What's the worst thing that can happen to your computer? Worse than a hard disk crash, virus infection, spam assault, denial-of-service attack, hacker take-over, fire, flood, or other human, mechanical or natural disaster is a faulty backup when you really need it. If the computer blows up, as long as your data is backed up securely, you can…
Siegel, Carole E.; Laska, Eugene; Meisner, Morris
2004-01-01
Objectives. We sought to estimate the extended mental health service capacity requirements of persons affected by the September 11, 2001, terrorist attacks. Methods. We developed a formula to estimate the extended mental health service capacity requirements following disaster situations and assessed availability of the information required by the formula. Results. Sparse data exist on current services and supports used by people with mental health problems outside of the formal mental health specialty sector. There also are few systematically collected data on mental health sequelae of disasters. Conclusions. We recommend research-based surveys to understand service usage in non–mental health settings and suggest that federal guidelines be established to promote uniform data collection of a core set of items in studies carried out after disasters. PMID:15054009
An authentication scheme for secure access to healthcare services.
Khan, Muhammad Khurram; Kumari, Saru
2013-08-01
Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.
Clinical characteristics of patients with epilepsy in a specialist neuropsychiatry service.
Osman, Adam; Seri, Stefano; Cavanna, Andrea E
2016-05-01
Neuropsychiatry services provide specialist input into the assessment and management of behavioral symptoms associated with a range of neurological conditions, including epilepsy. Despite the centrality of epilepsy to neuropsychiatry and the recent expansion of neuropsychiatry service provision, little is known about the clinical characteristics of patients with epilepsy who are routinely seen by a specialist neuropsychiatry service. This retrospective study filled this gap by retrospectively evaluating a naturalistic series of 60 consecutive patients with epilepsy referred to and assessed within a neuropsychiatry setting. Fifty-two patients (86.7%) had active epilepsy and were under the ongoing care of the referring neurologist for seizure management. The majority of patients (N=42; 70.0%) had a diagnosis of localization-related epilepsy, with temporal lobe epilepsy as the most common epilepsy type (N=37; 61.7%). Following clinical assessment, 39 patients (65.0%) fulfilled formal diagnostic criteria for at least one psychiatric disorder; nonepileptic attack disorder (N=37; 61.7%), major depression (N=23; 38.3%), and generalized anxiety disorder (N=16; 26.7%) were the most commonly diagnosed comorbidities. The clinical characteristics of patients seen in specialist neuropsychiatry settings are in line with the results from previous studies in neurology clinics in terms of both epilepsy and psychiatric comorbidity. Our findings confirm the need for the development and implementation of structured care pathways for the neuropsychiatric aspects of epilepsy, with focus on comorbid nonepileptic attacks and affective and anxiety symptoms. This is of particular importance in consideration of the impact of behavioral symptoms on patients' health-related quality of life. Copyright © 2016 Elsevier Inc. All rights reserved.
Barton, Pelham; Sheppard, James P; Penaloza-Ramos, Cristina M; Jowett, Sue; Ford, Gary A; Lasserson, Daniel; Mant, Jonathan; Mellor, Ruth M; Quinn, Tom; Rothwell, Peter M; Sandler, David; Sims, Don; McManus, Richard J
2017-11-25
The aim of this study was to examine the impact of transient ischaemic attack (TIA) service modification in two hospitals on costs and clinical outcomes. Discrete event simulation model using data from routine electronic health records from 2011. Patients with suspected TIA were followed from symptom onset to presentation, referral to specialist clinics, treatment and subsequent stroke. Included existing versus previous (less same day clinics) and hypothetical service reconfiguration (7-day service with less availability of clinics per day). The primary outcome of the model was the prevalence of major stroke after TIA. Secondary outcomes included service costs (including those of treating subsequent stroke) and time to treatment and attainment of national targets for service provision (proportion of high-risk patients (according to ABCD 2 score) seen within 24 hours). The estimated costs of previous service provision for 490 patients (aged 74±12 years, 48.9% female and 23.6% high risk) per year at each site were £340 000 and £368 000, respectively. This resulted in 31% of high-risk patients seen within 24 hours of referral (47/150) with a median time from referral to clinic attendance/treatment of 1.15 days (IQR 0.93-2.88). The costs associated with the existing and hypothetical services decreased by £5000 at one site and increased £21 000 at the other site. Target attainment was improved to 79% (118/150). However, the median time to clinic attendance was only reduced to 0.85 days (IQR 0.17-0.99) and thus no appreciable impact on the modelled incidence of major stroke was observed (10.7 per year, 99% CI 10.5 to 10.9 (previous service) vs 10.6 per year, 99% CI 10.4 to 10.8 (existing service)). Reconfiguration of services for TIA is effective at increasing target attainment, but in services which are already working efficiently (treating patients within 1-2 days), it has little estimated impact on clinical outcomes and increased investment may not be worthwhile. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
State Policies on Service Dogs for Military Veterans.
Reed, James B
2015-12-01
U.S. service members returning home from combat often face physical, mental and emotional challenges. Providing service dogs to these veterans is one method being used successfully to help address the difficulties they face. Under the federal Americans with Disabilities Act (ADA), a service animal is defined as "any dog that is individually trained to do work or perform tasks for the benefit of an individual with a disability, including a physical, sensory, psychiatric, intellectual or other mental disability." The work the dog undertakes must be directly related to the person's disability. Examples include guiding people who are blind, pulling a wheelchair, alerting a person with hearing loss, protecting a person having a seizure, and calming someone with post-traumatic stress disorder (PTSD) during an anxiety attack or psychiatric episode.
Changing Course: Re-Thinking Teacher Education Course Design
ERIC Educational Resources Information Center
Wassermann, Selma
2017-01-01
In the recent past, during the 36 hours of required coursework necessary to become a certified teacher in the state of New York, not a single course deviated from the same model of teacher centered lectures and a long list of "to dos" that would presumably enable pre-service students to face 30 odd children in their own classrooms with…
ERIC Educational Resources Information Center
Cook, Kristin Leigh
2012-01-01
Responding to calls for an empirical glimpse into a socioscientific issues (SSI)-based curriculum that aims to promote democratic participation, enhance students' connections to science, and empower students for the betterment of society (Dos Santos, 2008; Sadler, Barab, & Scott, 2007; Tal & Kedmi, 2006; Fusco & Barton, 2001; Hodson, 2003), this…
From the Back of the Foxhole: Black Correspondents in World War II. Journalism Monographs, No. 27.
ERIC Educational Resources Information Center
Stevens, John D.
Black newspapers, like the "Chicago Defender,""The Pittsburgh Courier," and the "Baltimore Afro-American," opened the eyes of Americans to the injustices suffered at home as well as in the armed services. The black press attacked the Navy for its Jim Crowism because when World War II began, the only black sailors were…
1986-10-23
economic crisis, unemployment; the impact of new tech- nologies on the workers; the attack on welfare results achieved by the trade unions, and against...remaining 80 percent in the second half! Electric Construction [ Economic Combine], for example, has a target as subcontractor of 3,865,000 leva, yet...exports of electronic and electrical engineering industrial output. A large number of economic organizations are serviced by the
A Look at the Law, Public Safety, Corrections & Security Cluster
ERIC Educational Resources Information Center
Coffee, Joseph N.
2008-01-01
A month after the 9/11 terrorist attack in 2001, an advisory group met in Little Rock, Arkansas, to begin the development of the Law, Public Safety, Corrections and Security (LPSCS) career cluster. At that time there were five pathways of what was then called the Law and Public Safety cluster--fire and emergency services, law enforcement,…
Divorce, Race, and Military Service: More than Equal Pay and Equal Opportunity
ERIC Educational Resources Information Center
Teachman, Jay D.; Tedrow, Lucky
2008-01-01
Several researchers have suggested that the persistently higher rate of divorce among Blacks may be due to hard-to-measure concepts such as culture or norms. To attack this problem, we use data from the NLSY-79 to examine the risk of divorce among enlisted active-duty military servicemen where economic differences and the negative effects of…
Deception Using an SSH Honeypot
2017-09-01
the device itself but also the device’s cloud and mobile infrastructure. This increase in unsecured devices connected to the Internet presents...have SSH enabled on their systems without knowledge that this service is running. Computer -security professionals use several techniques to gain...early 2000s. Honeypots are decoy computer systems intended for no other purpose than to collect data on attackers. They gather information about
ERIC Educational Resources Information Center
Mastrocola, Seth S.; Flynn, Deborah P.
2017-01-01
In the current U.S. military operational environment, it has been estimated that up to 700,000 troop years (cumulative years of service including multiple tours of duty) have been logged over the past decade since offensive campaigns began, following the September 11, 2001, terrorist attacks (Smith, Benight, & Cieslak, 2013). With this influx…
Termite Control: Results of Testing at the U.S. Forest Service
Bradford M. Kard
1998-01-01
Liquid termiticide treatments to soil continue as the most widely used method to protect wooden structures from attack by both native and Formosan subterranean termites, and have been the mainstay of the pest control industry for decades. The Wood Products Insect Research Project was located at Gulfport, MS, until 1995, and is now headquartered on the Mississippi State...
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Lt. James Dumont lead the dedication service for a memorial to the343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Worldwide Report: Epidemiology.
1985-08-09
Rangpur Goiter Cases BARBADOS National Health Service Changes Spark Dispute (Bridgetown BARBADOS ADVOCATE, 20 Jun 85) Medical Practitioners...of Health Complex told that a medical team was working in the affected areas and that the high officials already visited the area. [Text] [Dhaka...drinking water and malnutrition food caused the attack of the diseases in these areas» Medical aids are quite inadequate to cope with this alarming
ERIC Educational Resources Information Center
Gilliard, Jennifer L.
2004-01-01
Sixteen preservice teachers participated in a service-learning project to build tolerance in the community as a result of their desire to do something or to make a difference after the terrorist attacks of September 11, 2001. Student reflection papers revealed an increase in student tolerance and feelings of competence after participating in the…
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Lt. James Dumont lead the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
Promoting Children's Resilience and Coping Following September 11, 2001: An Email Analysis.
ERIC Educational Resources Information Center
Kirkley, Kevin O.; Medway, Frederic J.
2003-01-01
Examines a sample of 45 emails written by adults in response to an Internet article on how to help children develop resilience and cope with hardship in the wake of the September 11, 2001 terrorist attacks. Results reveal that the sample responses often failed to include school-based support services, suggesting that schools may need to increase…
Assessing Resilience in the Global Undersea Cable Infrastructure
2012-06-01
ABBREVIATIONS ACMA Australian Communications and Media Authority AD Attacker-Defender FSSCC Financial Services Sector Coordinating Council...after a disruption to the value delivery of the system before the disruption. Finally, their article also highlights the critical importance of...Chang et al. (2006), gravity models take their name from Newton’s law of gravitation, and are commonly used by social scientists to model or
The impact of West Nile virus on birds in California’s hardwood rangelands
Thomas Scott; Pey-Yi Lee; Kerry Paggett; Ryan Carney; Stan Husted; Walter Koenig
2008-01-01
West Nile virus has undergone an unprecedented rate of infection in North America, sweeping from New York to California in four years. It attacked an exceptionally broad range of hosts/vectors over a broad geographic area. In 2004, the California Department of Health Services received approximately 98,000 reports of dead birds, representing tens of millions of birds...
Preventing Catastrophes from Data Loss
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
What's the worst thing that can happen to a computer? Worse than a hard disk crash, virus infection, spare assault, denial-of-service attack, hacker take-over, fire, flood or some other human, mechanical or natural disaster is a faulty backup when it is really needed. If the computer blows up, as long as the data is backed up securely, it can be…
Huang, Cheng; Guo, Chaoran; Yu, Shaohua; Feng, Yan; Song, Julia; Eriksen, Michael; Redmon, Pam; Koplan, Jeffrey
2013-09-01
To investigate smoking prevalence and cessation services provided by male physicians in hospitals in three Chinese cities. Data were collected from a survey of male physicians employed at 33 hospitals in Changsha, Qingdao and Wuxi City (n=720). Exploratory factor analysis was performed to identify latent variables, and confirmatory structural equation modelling analysis was performed to test the relationships between predictor variables and smoking in male physicians, and their provision of cessation services. Of the sampled male physicians, 25.7% were current smokers, and 54.0% provided cessation services by counselling (18.8%), distributing self-help materials (17.1%), and providing traditional remedies or medication (18.2%). Factors that predicted smoking included peer smoking (OR 1.14 95% CI 1.03 to 1.26) and uncommon knowledge (OR 0.94 95% CI 0.89 to 0.99), a variable measuring awareness of the association of smoking with stroke, heart attack, premature ageing and impotence in male adults as well as the role of passive smoking in heart attack. Factors that predicted whether physicians provided smoking cessation services included peer smoking (OR 0.82 95% CI 0.76 to 0.89), physicians' own smoking (OR 0.87 95% CI 0.81 to 0.93), training in cessation (OR 1.36 95% CI 1.27 to 1.45) and access to smoking cessation resources (OR 1.69 95% CI 1.58 to 1.82). The smoke-free policy is not strictly implemented at healthcare facilities, and smoking remains a public health problem among male physicians. A holistic approach, including a stricter implementation of the smoke-free policy, comprehensive education on the hazards of smoking, training in standard smoking-cessation techniques and provision of cessation resources, is needed to curb the smoking epidemic among male physicians and to promote smoking cessation services in China.
Mc Sharry, Jennifer; Baxter, Alison; Wallace, Louise M; Kenton, Anthony; Turner, Andrew; French, David P
2014-01-01
Prompt treatment following Transient Ischemic Attack (TIA) can reduce the risk of subsequent stroke and disability. However, many patients delay in making contact with medical services. This study aimed to explore TIA patients' accounts of delay between symptom onset and contacting medical services including how decisions to contact services were made and the factors discussed in relation to delay. Twenty interviews were conducted with TIA patients in England. Using a previous systematic review as an initial framework, interview data were organised into categories of symptom recognition, presence of others and type of care sought. A thematic analysis was then conducted to explore descriptions of care-seeking relevant to each category. Delay in contacting medical services varied from less than an hour to eight days. Awareness of typical stroke symptoms could lead to urgent action when more severe TIA symptoms were present but could lead to delay when experienced symptoms were less severe. The role of friends and family varied widely from deciding on and enacting care-seeking decisions to simply providing transport to the GP practice. When family or friends played a greater role, and both made and enacted care-seeking decisions, delays were often shorter, even when patients themselves failed to identify symptoms. Healthcare professionals also impacted on patients' care-seeking with greater delays in seeking further care for the same episode described when patients perceived a lack of urgency during initial healthcare interactions. This study provides new information on patients' decisions to contact medical services following TIA and identifies overlapping factors that can lead to delay in receiving appropriate treatment. While recognition of symptoms may contribute to delay in contacting medical services, additional factors, including full responsibility being taken by others and initial healthcare interactions, can over-ride or undermine the importance of patients' own identification of TIA.
Mc Sharry, Jennifer; Baxter, Alison; Wallace, Louise M.; Kenton, Anthony; Turner, Andrew; French, David P.
2014-01-01
Background Prompt treatment following Transient Ischemic Attack (TIA) can reduce the risk of subsequent stroke and disability. However, many patients delay in making contact with medical services. This study aimed to explore TIA patients' accounts of delay between symptom onset and contacting medical services including how decisions to contact services were made and the factors discussed in relation to delay. Methods Twenty interviews were conducted with TIA patients in England. Using a previous systematic review as an initial framework, interview data were organised into categories of symptom recognition, presence of others and type of care sought. A thematic analysis was then conducted to explore descriptions of care-seeking relevant to each category. Results Delay in contacting medical services varied from less than an hour to eight days. Awareness of typical stroke symptoms could lead to urgent action when more severe TIA symptoms were present but could lead to delay when experienced symptoms were less severe. The role of friends and family varied widely from deciding on and enacting care-seeking decisions to simply providing transport to the GP practice. When family or friends played a greater role, and both made and enacted care-seeking decisions, delays were often shorter, even when patients themselves failed to identify symptoms. Healthcare professionals also impacted on patients' care-seeking with greater delays in seeking further care for the same episode described when patients perceived a lack of urgency during initial healthcare interactions. Conclusions This study provides new information on patients' decisions to contact medical services following TIA and identifies overlapping factors that can lead to delay in receiving appropriate treatment. While recognition of symptoms may contribute to delay in contacting medical services, additional factors, including full responsibility being taken by others and initial healthcare interactions, can over-ride or undermine the importance of patients' own identification of TIA. PMID:25137185
2012-04-25
Title I of the James Zadroga 9/11 Health and Compensation Act of 2010 amended the Public Health Service Act (PHS Act) to establish the World Trade Center (WTC) Health Program. Sections 3311, 3312, and 3321 of Title XXXIII of the PHS Act require that the WTC Program Administrator develop regulations to implement portions of the WTC Health Program established within the Department of Health and Human Services (HHS). The WTC Health Program, which is administered by the Director of the National Institute for Occupational Safety and Health (NIOSH), within the Centers for Disease Control and Prevention (CDC), provides medical monitoring and treatment to eligible firefighters and related personnel, law enforcement officers, and rescue, recovery and cleanup workers who responded to the September 11, 2001, terrorist attacks in New York City, Shanksville, PA, and at the Pentagon, and to eligible survivors of the New York City attacks. This final rule establishes the processes by which the WTC Program Administrator may add a new condition to the list of WTC-related health conditions through rulemaking, including a process for considering petitions by interested parties to add a new condition.
Shen, Qinghua; Liang, Xiaohui; Shen, Xuemin; Lin, Xiaodong; Luo, Henry Y
2014-03-01
In this paper, we propose an e-health monitoring system with minimum service delay and privacy preservation by exploiting geo-distributed clouds. In the system, the resource allocation scheme enables the distributed cloud servers to cooperatively assign the servers to the requested users under the load balance condition. Thus, the service delay for users is minimized. In addition, a traffic-shaping algorithm is proposed. The traffic-shaping algorithm converts the user health data traffic to the nonhealth data traffic such that the capability of traffic analysis attacks is largely reduced. Through the numerical analysis, we show the efficiency of the proposed traffic-shaping algorithm in terms of service delay and privacy preservation. Furthermore, through the simulations, we demonstrate that the proposed resource allocation scheme significantly reduces the service delay compared to two other alternatives using jointly the short queue and distributed control law.
Effects of service environments on aluminum-brazed titanium (ABTi)
NASA Technical Reports Server (NTRS)
Cotton, W. L.
1978-01-01
Aluminum brazed titanium (ABTi) structures were evaluated during prolonged exposure to extreme environments: elevated temperature exposure to airline service fluids, hydraulic fluid, and seawater, followed by laboratory corrosion tests. Solid-face and perforated face honeycomb sandwich panel specimens, stressed panel assemblies, and faying surface brazed joints were tested. The corrosion resistance of ABTi is satisfactory for commercial airline service. Unprotected ABTi proved inherently resistant to attack by all of the extreme service aircraft environments except: seawater at 700 K (800 F) and above, dripping phosphate ester hydraulic fluid at 505 K (450 F), and a marine environment at ambient temperature. The natural oxides and deposits present on titanium surfaces in airline service provide protection against hot salt corrosion pitting. Coatings are required to protect titanium dripping phosphate ester fluid at elevated temperatures and to protect exposed acoustic honeycomb parts against corrosion in a marine environment.
LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP
NASA Astrophysics Data System (ADS)
Chenait, Manel
Mobile IP represents a simple and scalable global mobility solution. However, it inhibits various vulnerabilities to malicious attacks and, therefore, requires the integration of appropriate security services. In this paper, we discuss two authentication schemes suggested for Mobile IP: standard authentication and Mobile IP/AAA authentication. In order to provide Mobile IP roaming services including identity verication, we propose an improvement to Mobile/AAA authentication scheme by applying a local politic key management in each domain, hence we reduce hando latency by avoiding the involvement of AAA infrastructure during mobile node roaming.
Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection
NASA Astrophysics Data System (ADS)
Flegel, Ulrich; Kerschbaum, Florian; Miseldine, Philip; Monakova, Ganna; Wacker, Richard; Leymann, Frank
One company by itself cannot detect all instances of fraud or insider attacks. An example is the simple case of buyer fraud: a fraudulent buyer colludes with a supplier creating fake orders for supplies that are never delivered. They circumvent internal controls in place to prevent this kind of fraud, such as a goods receipt, e.g., by ordering services instead of goods. Based on the evidence collected at one company, it is often extremely difficult to detect such fraud, but if companies collaborate and correlate their evidence, they could detect that the ordered services have never actually been provided.
Data Retention and Anonymity Services
NASA Astrophysics Data System (ADS)
Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.
Security challenge to using smartphones for SHM
NASA Astrophysics Data System (ADS)
Abueh, Yeka; Liu, Hong
2016-04-01
Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.
Business continuity strategies for cyber defence: battling time and information overload.
Streufert, John
2010-11-01
Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.
Rodoplu, Ulkumen; Arnold, Jeffrey; Ersoy, Gurkan
2003-01-01
Over the past two decades, terrorism has exacted an enormous toll on the Republic of Turkey, a secular democracy with a 99.8% Muslim population. From 1984 to 2000, an estimated 30,000 to 35,000 Turkish citizens were killed by a nearly continuous stream of terrorism-related events. During this period, the Partiya Karekerren Kurdistan (PKK), a Kurdish separatist group (re-named KADEK in 2002), was responsible for the vast majority of terrorism-related events (and casualties), which disproportionately affected the eastern and southeastern regions of Turkey, in which the PKK has focused its activities. Most terrorist attacks over the past two decades have been bombings or shootings that produced < 10 casualties per event. From 1984 to 2003, 15 terrorist attacks produced > or = 30 casualties (eight shootings, five bombings, and two arsons). The maximum number of casualties produced by any of these events was 93 in the Hotel Madimak arson attack by the Turkish Islamic Movement in 1993. This pattern suggests that terrorist attacks in Turkey rarely required more than local systems of emergency medical response, except in rural areas where Emergency Medical Services (EMS) are routinely provided by regional military resources. The last decade has seen the development of several key systems of local emergency response in Turkey, including the establishment of the medical specialty of Emergency Medicine, the establishment of training programs for EMS providers, the spread of a generic, Turkish hospital emergency plan based on the Hospital Emergency Incident Command System, and the spread of advanced training in trauma care modeled after Advanced Trauma Life Support.
The current state of bioterrorist attack surveillance and preparedness in the US
Grundmann, Oliver
2014-01-01
The use of biological agents as weapons to disrupt established structures, such as governments and especially larger urban populations, has been prevalent throughout history. Following the anthrax letters sent to various government officials in the fall of 2001, the US has been investing in prevention, surveillance, and preparation for a potential bioterrorism attack. Additional funding authorized since 2002 has assisted the Centers for Disease Control and Prevention, the Department of Health and Human Services, and the Environmental Protection Agency to invest in preventative research measures as well as preparedness programs, such as the Laboratory Response Network, Hospital Preparedness Program, and BioWatch. With both sentinel monitoring systems and epidemiological surveillance programs in place for metropolitan areas, the immediate threat of a large-scale bioterrorist attack may be limited. However, early detection is a crucial factor to initiate immediate response measures to prevent further spread following dissemination of a biological agent. Especially in rural areas, an interagency approach to train health care workers and raise awareness for the general public remain primary tasks, which is an ongoing challenge. Risk-management approaches in responding to dissemination of biological agents, as well as appropriate decontamination measures that reduce the probability of further contamination, have been provided, and suggest further investments in preparedness and surveillance. Ongoing efforts to improve preparedness and response to a bioterrorist attack are crucial to further reduce morbidity, mortality, and economic impact on public health. PMID:25328421
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
Fothergill, Rachael T; Watson, Lynne R; Virdi, Gurkamal K; Moore, Fionna P; Whitbread, Mark
2014-01-01
This study reports survival outcomes for patients resuscitated from out-of-hospital cardiac arrest (OHCA) subsequent to ST-elevation myocardial infarction (STEMI), and who were conveyed directly by ambulance clinicians to a specialist Heart Attack Centre for expert cardiology assessment, angiography and possible percutaneous coronary intervention (PCI). This is a retrospective descriptive review of data sourced from the London Ambulance Service's OHCA registry over a one-year period. We observed excellent survival rates for our cohort of patients with 66% of patients surviving to be discharged from hospital, the majority of whom were still alive after one year. Those who survived tended to be younger, to have had a witnessed arrest in a public place with an initial cardiac rhythm of VF/VT, and to have been transported to the specialist centre more quickly than those who did not. A system allowing ambulance clinicians to autonomously convey OHCA STEMI patients who achieve a return of spontaneous circulation directly to a Heart Attack Centre is highly effective and yields excellent survival outcomes. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
On the security of two remote user authentication schemes for telecare medical information systems.
Kim, Kee-Won; Lee, Jae-Dong
2014-05-01
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.
Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander
2017-01-01
Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Scheduling multimedia services in cloud computing environment
NASA Astrophysics Data System (ADS)
Liu, Yunchang; Li, Chunlin; Luo, Youlong; Shao, Yanling; Zhang, Jing
2018-02-01
Currently, security is a critical factor for multimedia services running in the cloud computing environment. As an effective mechanism, trust can improve security level and mitigate attacks within cloud computing environments. Unfortunately, existing scheduling strategy for multimedia service in the cloud computing environment do not integrate trust mechanism when making scheduling decisions. In this paper, we propose a scheduling scheme for multimedia services in multi clouds. At first, a novel scheduling architecture is presented. Then, We build a trust model including both subjective trust and objective trust to evaluate the trust degree of multimedia service providers. By employing Bayesian theory, the subjective trust degree between multimedia service providers and users is obtained. According to the attributes of QoS, the objective trust degree of multimedia service providers is calculated. Finally, a scheduling algorithm integrating trust of entities is proposed by considering the deadline, cost and trust requirements of multimedia services. The scheduling algorithm heuristically hunts for reasonable resource allocations and satisfies the requirement of trust and meets deadlines for the multimedia services. Detailed simulated experiments demonstrate the effectiveness and feasibility of the proposed trust scheduling scheme.
Document image archive transfer from DOS to UNIX
NASA Technical Reports Server (NTRS)
Hauser, Susan E.; Gill, Michael J.; Thoma, George R.
1994-01-01
An R&D division of the National Library of Medicine has developed a prototype system for automated document image delivery as an adjunct to the labor-intensive manual interlibrary loan service of the library. The document image archive is implemented by a PC controlled bank of optical disk drives which use 12 inch WORM platters containing bitmapped images of over 200,000 pages of medical journals. Following three years of routine operation which resulted in serving patrons with articles both by mail and fax, an effort is underway to relocate the storage environment from the DOS-based system to a UNIX-based jukebox whose magneto-optical erasable 5 1/4 inch platters hold the images. This paper describes the deficiencies of the current storage system, the design issues of modifying several modules in the system, the alternatives proposed and the tradeoffs involved.
Robust anonymous authentication scheme for telecare medical information systems.
Xie, Qi; Zhang, Jun; Dong, Na
2013-04-01
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
Design and Implementation of a Telecardiology System for Mobile Devices.
Cinaglia, Pietro; Tradigo, Giuseppe; Guzzi, Pietro H; Veltri, Pierangelo
2015-09-01
This paper presents the design and implementation of a system for digital telecardiology on mobile devices called Remote Cardio Consultation (RCC). Using RCC may improve first intervention procedures in case of heart attack. In fact, it allows physicians to remotely consult ECG signals from a mobile device or smartphone by using a so-called app. The remote consultation is implemented by a server application collecting physician availability to answer upon client support requests. The app can be used by first intervention clinicians and allows reducing delays and decision errors in emergency interventions. Thus, best decision, certified and supported by cardiologists, can be obtained in case of heart attacks and first interventions even by base medical doctors able to produce and send an ECG. RCC tests have been performed, and the prototype is freely available as a service for testing.
Muro, Marcelo; Cohen, Roberto; Maffei, Daniel; Ballesteros, Marcelo; Espinosa, Luis
2003-01-01
Major terrorist attacks in Argentina since 1990 have been limited to two bombings in Buenos Aires, which together caused 115 deaths and left at least 555 injured. Following these attacks, national, regional, and local institutions responsible for emergency response in Argentina sought to improve their planning and preparedness for terrorism-related events. In 1996, the national government enacted legislation, which launched the Sistema Federal de Emergencias (SIFEM) or Federal Emergency System under the direction of the president. Since 1997, several of Argentina's major cities have developed emergency plans for terrorism-related events, including intentional biological and chemical releases. Institutional participants in emergency preparedness for terrorism-related events include Emergency Medical Services, hospitals, and the public health system. Remaining challenges include: (1) Improving intra-agency coordination; (2) Improving intra-agency communication; and (3) Improving and expanding emergency response training programs for responders and the general population.
Security Concepts for Satellite Links
NASA Astrophysics Data System (ADS)
Tobehn, C.; Penné, B.; Rathje, R.; Weigl, A.; Gorecki, Ch.; Michalik, H.
2008-08-01
The high costs to develop, launch and maintain a satellite network makes protecting the assets imperative. Attacks may be passive such as eavesdropping on the payload data. More serious threat are active attacks that try to gain control of the satellite, which may lead to the total lost of the satellite asset. To counter these threats, new satellite and ground systems are using cryptographic technologies to provide a range of services: confidentiality, entity & message authentication, and data integrity. Additionally, key management cryptographic services are required to support these services. This paper describes the key points of current satellite control and operations, that are authentication of the access to the satellite TMTC link and encryption of security relevant TM/TC data. For payload data management the key points are multi-user ground station access and high data rates both requiring frequent updates and uploads of keys with the corresponding key management methods. For secure satellite management authentication & key negotiation algorithms as HMAC-RIPEMD160, EC- DSA and EC-DH are used. Encryption of data uses algorithms as IDEA, AES, Triple-DES, or other. A channel coding and encryption unit for payload data provides download data rates up to Nx250 Mbps. The presented concepts are based on our experience and heritage of the security systems for all German MOD satellite projects (SATCOMBw2, SAR-Lupe multi- satellite system and German-French SAR-Lupe-Helios- II systems inter-operability) as well as for further international (KOMPSAT-II Payload data link system) and ESA activities (TMTC security and GMES).
Buen Comienzo, Buen Futuro: El Bebe de Dos Meses (Healthy Start, Grow Smart: Your Two-Month-Old).
ERIC Educational Resources Information Center
Department of Education, Washington, DC.
Distributed by the U.S. Departments of Agriculture, Education, and Health and Human Services, this Spanish-language pamphlet provides parents with information and advice about their infants in the second month of life. The pamphlet outlines typical infant behavior at 2 months of age, the need for regular visits to a physician, health insurance,…
Temporal Comparisons of Internet Topology
2014-06-01
Number CAIDA Cooperative Association of Internet Data Analysis CDN Content Delivery Network CI Confidence Interval DoS denial of service GMT Greenwich...the CAIDA data. Our methods include analysis of graph theoretical measures as well as complex network and statistical measures that will quantify the...tool that probes the Internet for topology analysis and performance [26]. Scamper uses network diagnostic tools, such as traceroute and ping, to probe
Web services as applications' integration tool: QikProp case study.
Laoui, Abdel; Polyakov, Valery R
2011-07-15
Web services are a new technology that enables to integrate applications running on different platforms by using primarily XML to enable communication among different computers over the Internet. Large number of applications was designed as stand alone systems before the concept of Web services was introduced and it is a challenge to integrate them into larger computational networks. A generally applicable method of wrapping stand alone applications into Web services was developed and is described. To test the technology, it was applied to the QikProp for DOS (Windows). Although performance of the application did not change when it was delivered as a Web service, this form of deployment had offered several advantages like simplified and centralized maintenance, smaller number of licenses, and practically no training for the end user. Because by using the described approach almost any legacy application can be wrapped as a Web service, this form of delivery may be recommended as a global alternative to traditional deployment solutions. Copyright © 2011 Wiley Periodicals, Inc.
Hunter-Killer Teams: Attacking Enemy Safe Havens
2010-01-01
previous practitioners through the venue of lessons learned passed on generationally. U.S. Army operations against the Southwest Indians, the Texas...much had been learned by the Office of Strategic Services (OSS) conducting guerrilla warfare activities. Prior to the Vietnam War, it was the...type formations throughout U.S. history to derive the advantages and disadvantages of their use, to capture key lessons learned about their
Final Shaw AFB Chaff and Flare Environmental Assessment
2003-12-01
Resources Conservation Service NWR National Wildlife Refuge SAT Surface Attack Tactics SCL South Carolina Lakes SEAD Suppression of Enemy Air Defenses...provide many recreational opportunities for tourists and local residents. Fishing is the most popular sport on both water bodies ( SCL 2003). The...flares with expired shelf lives or defects are returned to the supply depot responsible for their disposal. Final disposal of unusable chaff and
When The Shooting Stops: Recovery From Active Shooter Events For K-12 Schools
2017-12-01
ems -insider/articles/2014/02/a-new-response.html. 2 Ashby, Cornelia, and William O. Jenkins Jr. Emergency Management: Most School Districts Have...of Emergency Medical Services, March 18, 2014, http://www.jems.com/ ems -insider/ articles/2014/02/a-new-response.html. xviii THIS PAGE...Gang violence Bomb threats Domestic violence and abuse Cyber attacks Suicide 72
ERIC Educational Resources Information Center
Misfeldt, Morten
2015-01-01
In this paper I describe how students use a project management simulation game based on an attack-defense mechanism where two teams of players compete by challenging each other's projects. The project management simulation game is intended to be played by pre-service construction workers and engineers. The gameplay has two parts: a planning part,…
Entropy-as-a-Service: Unlocking the Full Potential of Cryptography.
Vassilev, Apostol; Staples, Robert
2016-09-01
Securing the Internet requires strong cryptography, which depends on the availability of good entropy for generating unpredictable keys and accurate clocks. Attacks abusing weak keys or old inputs portend challenges for the Internet. EaaS is a novel architecture providing entropy and timestamps from a decentralized root of trust, scaling gracefully across diverse geopolitical locales and remaining trustworthy unless much of the collective is compromised.
Sustaining Operational Maneuver in the Twenty-First Century
2010-05-13
battalion had two truck companies, each with 48 trucks and trailers , a medical detachment, and a headquarters company. Attached service and truck...division in the attack.176 A reserve unit which managed a rolling ammunition transfer point with 20 trailers loaded with ammunition augmenting the...the 1st Infantry Division with four maneuver brigades and an aviation brigade. Completing reception , staging, onward movement, and integration is the
Protecting the Power Grid From Electromagnetic Pulses
NASA Astrophysics Data System (ADS)
Simpson, Sarah
2004-10-01
A nuclear explosion high in the Earth's atmosphere does no immediate known harm to living things, but the resulting electromagnetic pulse (EMP) from a single detonation could degrade 70 percent or more of the country's electrical service in an instant, warns the Commission to Assess the Threat to the United States from Electromagnetic Pulse Attack, which presented its findings to the U.S. Congress in July.
Piñon mortality from 2001 to 2005: Causes and management strategies
Tom Eager
2008-01-01
(Please note, this is an abstract only) Pinon mortality in the pinon-juniper and pinon-sage types of the Southwest peaked in 2003 following several years of winter drought. The majority of the droughtweakened trees died from pinon ips bark beetle attacks, but twig beetles also played a role. Forest Service aerial surveyors estimate more than 50 million pinon trees died...
Corrosion of metals in treated wood examined by synchrotron based xanes and XFM
Samuel L. Zelinka; Joseph E. Jakes; Grant T. Kirker; Leandro Passarini; Barry Lai
2016-01-01
Copper based waterborne wood preservatives are frequently used to extend the service life of wood products used in outdoor environments. While these copper based treatments protect the wood from fungal decay and insect attack, they increase the corrosion of metals embedded or in contact with the treated wood. Over the past ten years, several studies have looked at the...
Samuel L. Zelinka; Joseph E. Jakes; Grant T. Kirker; David Vine; Stefan Vogt
2017-01-01
Copper based waterborne wood preservatives are frequently used to extend the service life of wood products when subjected to frequent moisture exposure. While these copper based treatments protect the wood from fungal decay and insect attack, they increase the corrosion of metals embedded or in contact with the treated wood. Previous research has shown the most...
Developing Simulated Cyber Attack Scenarios Against Virtualized Adversary Networks
2017-03-01
MAST is a custom software framework originally designed to facilitate the training of network administrators on live networks using SimWare. The MAST...or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services ...scenario development and testing in a virtual test environment. Commercial and custom software tools that provide the ability to conduct network
An Analysis of the Defense Acquisition Strategy for Unmanned Systems
2014-03-01
product service code RAA Rapid Acquisition Authority RCS radar cross section REF Rapid Equipping Force RFID radio frequency identification RDT...commercialization of the radio frequency identification (RFID) chip also provides a useful basis for comparison. WWII served as the proving ground for RFID...companies following the September 11 , 2001 attacks. It is important to note that despite advances in GPS technology and long-range communications
Microprocessor Front-End Terminal Study.
1981-06-01
Engineer APPROVED: .HN MARCINIAK, Colonel, USAF hief, Information Sciences Division FOR THE COMANDER: JOHN P. HUSS Acting Chief, Plans Office If your...friendly forces. The files are maintained by this branch acting independently or in coordination with lateral services or national agencies. 24 MFT Final...and reconnaissance mission results are analyzed to determine the degree of success of the attack. Target damage assessments are made, and targets are
An Engineering Report in Civil Engineering and Management.
1987-12-01
programs as the Apollo program and the Canaveral program. Progress in the late 70s and the 80s has seen advancements in the application of sophisticated...other forces in military operations; subsequent combat service support ashore and defense against overt or clandestine enemy attacks directed toward...construction execution plans; assigns construction projects to NCF units; monitors progress and assures adherence to quality standards: directs
2015-09-11
Rick Anderson, fire chief at NASA's Kennedy Space Center, on podium, left, and Brevard County Sheriff Wayne Ivey take part in the dedication service for a memorial to the 343 first responder victims of the Sept. 11, 2001, terror attacks at Kennedy's Fire Station 1 on Sept. 11, 2015. The ceremony dedicated a monument that includes a section of steel I-beam from the World Trade Center in New York.
At the Edge of Danger: Elementary Teachers in Queens, New York, September 11, 2001
ERIC Educational Resources Information Center
Bisland, Beverly Milner (Lee)
2006-01-01
Teachers were among the public servants at work in New York City on September 11, 2001. This study focuses on the feelings and actions of a representative group of elementary teachers in Queens, New York. As they became aware of the unfolding tragedy of the World Trade Center attacks, they demonstrated the essential qualities of public service,…
Zhang, Haitao; Wu, Chenxue; Chen, Zewei; Liu, Zhao; Zhu, Yunhong
2017-01-01
Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules.
Wu, Chenxue; Liu, Zhao; Zhu, Yunhong
2017-01-01
Analyzing large-scale spatial-temporal k-anonymity datasets recorded in location-based service (LBS) application servers can benefit some LBS applications. However, such analyses can allow adversaries to make inference attacks that cannot be handled by spatial-temporal k-anonymity methods or other methods for protecting sensitive knowledge. In response to this challenge, first we defined a destination location prediction attack model based on privacy-sensitive sequence rules mined from large scale anonymity datasets. Then we proposed a novel on-line spatial-temporal k-anonymity method that can resist such inference attacks. Our anti-attack technique generates new anonymity datasets with awareness of privacy-sensitive sequence rules. The new datasets extend the original sequence database of anonymity datasets to hide the privacy-sensitive rules progressively. The process includes two phases: off-line analysis and on-line application. In the off-line phase, sequence rules are mined from an original sequence database of anonymity datasets, and privacy-sensitive sequence rules are developed by correlating privacy-sensitive spatial regions with spatial grid cells among the sequence rules. In the on-line phase, new anonymity datasets are generated upon LBS requests by adopting specific generalization and avoidance principles to hide the privacy-sensitive sequence rules progressively from the extended sequence anonymity datasets database. We conducted extensive experiments to test the performance of the proposed method, and to explore the influence of the parameter K value. The results demonstrated that our proposed approach is faster and more effective for hiding privacy-sensitive sequence rules in terms of hiding sensitive rules ratios to eliminate inference attacks. Our method also had fewer side effects in terms of generating new sensitive rules ratios than the traditional spatial-temporal k-anonymity method, and had basically the same side effects in terms of non-sensitive rules variation ratios with the traditional spatial-temporal k-anonymity method. Furthermore, we also found the performance variation tendency from the parameter K value, which can help achieve the goal of hiding the maximum number of original sensitive rules while generating a minimum of new sensitive rules and affecting a minimum number of non-sensitive rules. PMID:28767687
Mattos, Denise; Mota, Solange; Dreyer, Gerusa
2008-01-01
The authors report on aspects of the social realities of children and adolescents living in Jaboatão dos Guararapes, State of Pernambuco, who were diagnosed with Bancroftian filariasis infection and were treated at the Filariasis Teaching, Research and Care Center of the Federal University of Pernambuco (Health Sciences Center), which is a tertiary-level reference service for filariasis. The patients' housing conditions were quantified and classified as subhuman, with a direct relationship with the maintenance of Bancroftian filariasis transmission, and the authors highlight the need for political decisions regarding the implementation of basic sanitation projects.
Climate Change, Migration, and Allergic Respiratory Diseases: An Update for the Allergist
Rottem, Menachem; Dahl, Ronald; Blaiss, Michael; Ridolo, Erminia; Cecchi, Lorenzo; Rosario, Nelson; Motala, Cassim; Ansotegui, Ignacio; Annesi-Maesano, Isabella
2011-01-01
Abstract Local climate changes can impact on a number of factors, including air pollution, that have been shown to influence both the development and attacks of allergic respiratory diseases, and thus, they represent an important consideration for the allergist. Migration involves exposure to a new set of pollutants and allergens as well as changes in housing conditions, diet, and accessibility to medical services, all of which are likely to affect migrants' health. This review provides an update on climate change, migration, and allergy and discusses factors for consideration when making recommendations for local allergy service provision and for assessing an individual patient's environmental exposures. PMID:23268459
Hansen, Marianne B; Nissen, Alexander; Heir, Trond
2013-01-01
Objective To assess the prevalence of post-traumatic stress disorder (PTSD) symptoms among governmental employees after the 2011 Oslo bombing attack targeted towards the Norwegian Ministries, and to explore the importance of proximity to the bomb explosion as a predictor of PTSD. Design A cross-sectional study. Setting Data were collected from a survey 10 months after the Oslo bombing on 22 July 2011. Participants A total of 3520 employees were invited to the study. Net samples comprised 1927 employees in 14 of the 17 Norwegian Ministries. Outcome measures The employees reported where they were at the time of the explosion. PTSD was assessed with the Norwegian version of the PTSD checklist (PCL). Results A total of 207 of the 1881 (11%) ministerial employees who completed the survey were present at work when the bomb exploded. Of these, a quarter (24%, 95% CI 18.4 to 30.0) had symptom levels equivalent to PTSD, while the prevalence was approximately 4% among those not present at work. In the latter group the prevalence was similar irrespective of whether their location was in Oslo, other places in Norway or abroad. Leadership responsibility was associated with lower risk for PTSD. Conclusions The risk of PTSD is mainly associated with being present at work at the time of a terror attack. For those not present at work, the risk of PTSD is low and independent of proximity to the terror scene. The findings may have implications for planning and priority of healthcare services after a work place terror attack. PMID:23872287
Hansen, Marianne B; Nissen, Alexander; Heir, Trond
2013-01-01
To assess the prevalence of post-traumatic stress disorder (PTSD) symptoms among governmental employees after the 2011 Oslo bombing attack targeted towards the Norwegian Ministries, and to explore the importance of proximity to the bomb explosion as a predictor of PTSD. A cross-sectional study. Data were collected from a survey 10 months after the Oslo bombing on 22 July 2011. A total of 3520 employees were invited to the study. Net samples comprised 1927 employees in 14 of the 17 Norwegian Ministries. The employees reported where they were at the time of the explosion. PTSD was assessed with the Norwegian version of the PTSD checklist (PCL). A total of 207 of the 1881 (11%) ministerial employees who completed the survey were present at work when the bomb exploded. Of these, a quarter (24%, 95% CI 18.4 to 30.0) had symptom levels equivalent to PTSD, while the prevalence was approximately 4% among those not present at work. In the latter group the prevalence was similar irrespective of whether their location was in Oslo, other places in Norway or abroad. Leadership responsibility was associated with lower risk for PTSD. The risk of PTSD is mainly associated with being present at work at the time of a terror attack. For those not present at work, the risk of PTSD is low and independent of proximity to the terror scene. The findings may have implications for planning and priority of healthcare services after a work place terror attack.
The San Bernardino, California, Terror Attack: Two Emergency Departments' Response.
Lee, Carol; Walters, Elizabeth; Borger, Rodney; Clem, Kathleen; Fenati, Gregory; Kiemeney, Michael; Seng, Sakona; Yuen, Ho-Wang; Neeki, Michael; Smith, Dustin
2016-01-01
On December 2, 2015, a terror attack in the city of San Bernardino, California killed 14 Americans and injured 22 in the deadliest attack on U.S. soil since September 11, 2001. Although emergency personnel and law enforcement officials frequently deal with multi-casualty incidents (MCIs), what occurred that day required an unprecedented response. Most of the severely injured victims were transported to either Loma Linda University Medical Center (LLUMC) or Arrowhead Regional Medical Center (ARMC). These two hospitals operate two designated trauma centers in the region and played crucial roles during the massive response that followed this attack. In an effort to shed a light on our response to others, we provide an account of how these two teaching hospitals prepared for and coordinated the medical care of these victims. In general, both centers were able to quickly mobilize large number of staff and resources. Prior disaster drills proved to be invaluable. Both centers witnessed excellent teamwork and coordination involving first responders, law enforcement, administration, and medical personnel from multiple specialty services. Those of us working that day felt safe and protected. Although we did identify areas we could have improved upon, including patchy communication and crowd-control, they were minor in nature and did not affect patient care. MCIs pose major challenges to emergency departments and trauma centers across the country. Responding to such incidents requires an ever-evolving approach as no two incidents will present exactly alike. It is our hope that this article will foster discussion and lead to improvements in management of future MCIs.
The political and economic context of home care work in California.
Delp, Linda; Muntaner, Carles
2010-01-01
California's primarily female, ethnically diverse home care workforce is at the intersection of the public and private spheres of work and at the front line of recurring policy and budget debates targeting government-funded long-term care services. The convening of a Home Care Research Working Group in 2001 has led to collaborative action research initiatives and advocacy for policies to improve working conditions and home care services. The study reported here demonstrates that: 1) current long-term care policy is inadequate to ameliorate home care stressors such as physical and emotional demands, schedule conflicts, financial strain, and job insecurity; 2) workers' experience of home care differs by gender and by race or ethnic group; and 3) a union that actively engages workers is a viable avenue to provide individual support and empowerment as well as collective advocacy for home care services, critical in an era of attacks against health and social service programs.
Knebel, Ann R; Martinelli, Angela M; Orsega, Susan; Doss, Thomas L; Balingit-Wines, Ana Marie; Konchan, Carol L
2010-06-01
The events of September 11, 2001, set in motion the broadest emergency response ever conducted by the US Department of Health and Human Services. In this article, some of the nurses who deployed to New York City in the aftermath of that horrific attack on the United States offer their recollections of the events. Although Public Health Service Commissioned Corps (PHS CC) officers participated in deployments before 9/11, this particular deployment accelerated the transformation of the PHS CC, because people came to realize the tremendous potential of a uniformed service of 6,000 health care professionals. When not responding to emergencies, PHS CC nurses daily serve the mission of the PHS to protect, promote, and advance the health and safety of the nation. In times of crisis, the PHS CC nurses stand ready to deploy in support of those in need of medical assistance. Published by Elsevier Inc.
How to control the costs of health care services--an inventory of strategic options.
Dionne, Francois; Mitton, Craig; Shoveller, Jean; Peacock, Stuart; Barer, Morris
2009-01-01
This paper has two objectives: (1) to provide an inventory of popular strategies for cost reduction or cost containment in the health services research literature and (2) to propose a coherent framework to organize this inventory. The purpose of this framework is to inform decision-makers when grappling with the opposing forces they face in choosing a cost reduction strategy. The trade-off is clear: to access progressively more possible strategies, the decision-maker must be ready to expose the population and patients to more significant changes in services provided. On one hand, more choices are preferable because each strategy attacks the problem from a different angle and being restricted to fewer "angles" increases the likelihood that a specific "well" may have dried up. On the other hand, we know that change is often viewed, a priori, negatively in health care management, so there are pressures to limit the impact on services.
Lupkovics, Géza; Motyovszki, Akos; Németh, Zoltán; Takács, István; Kenéz, András; Burkali, Bernadett; Menyhárt, Ildikó
2010-04-04
Morbidity and mortality rates of acute heart attack emphasize the significance of this patient group worldwide. The prompt and exact diagnosis and the timing of adequate therapy is crucial for this patients. Modern supply of acute heart attack includes invasive cardiology intervention, primer percutaneous coronary intervention. In year 1999, American and European recommendations suggested primer percutaneous coronary intervention only as an alternative possibility instead of thrombolysis, or in case of cardiogenic shock. 24 hour intervention unit for patients with acute heart attack was first organized in Hungary in Zala County Hospital's Cardiology Department, in year 1998. Our present study confirms, that since the intervention treatment has been introduced, average mortality rate has been reduced considerably in our area comparing to the national average. Mortality rates in West Transdanubian region and in Zalaegerszeg's micro-region were studied and compared for the period between 1997-2004, according to the data of National Public Health and Medical Officer Service. These data were then compared with the national average mortality data of Hungarian Central Statistical Office. With the help of our own computerized database we examined this period and compared the number of the completed invasive interventions to the mortality statistics. In the first full year, in 1998, we completed 82 primer and 283 elective PCIs; these number increased to 318 and 1265 by year 2005. At the same time, significant decrease of acute infarction related mortality was detectable among men of the Zalaegerszeg micro-region, comparing to the national average (p<0.001). The first Hungarian 24 hour acute heart attack intervention care improved the area's mortality statistics significantly, comparing to the national average. The skilled work of the experienced team means an important advantage to the patients in Zalaegerszeg micro-region.
Catalano, Ralph A; Kessell, Eric; Christy, Annette; Monahan, John
2005-07-01
Theories of perceived risk state that when people feel threatened, they will react more strongly than they would otherwise. This study tested the hypothesis that evaluations for involuntary psychiatric hospitalizations that were initiated by law enforcement personnel in Florida increased in the weeks after the attacks of September 11, 2001. The authors applied interrupted time-series designs to determine whether there was a relationship between the number of involuntary psychiatric examinations initiated by law enforcement officials and the attacks of September 11, 2001. They examined the number of psychiatric evaluations of men and women who were considered to be mentally ill and harmful to others by law enforcement personnel in Florida during seven-day periods ("areal" weeks) that began with Tuesday, July 6, 1999, and ended with Monday, December 31, 2001 (because September 11, 2001, fell on a Tuesday). Over the 130 weeks of the study, law enforcement officials initiated examinations of an average of 25.96 men and 13.47 women per areal week. Law enforcement officials initiated examinations of approximately 14 more women than expected in the areal week that began with September 11, 2001. During the three areal weeks that began with September 18, 2001, a total of 34 more men than expected were presented for evaluation. These findings cannot be attributed to trends, seasonality, other cycles, or the tendency of the examination time series to remain elevated or depressed after high or low values in the series. Perceived general risk in a community may increase the likelihood that law enforcement personnel and the persons who summon them perceive persons with mental illness as imminently harmful. The public health response to any future terror attacks should include efforts to alert psychiatric service providers to the possibility of lower community tolerance for mental illness in the aftermath of an attack.
Fiscal Year 2014: Comprehensive Oversight Plan for Southwest Asia
2013-09-30
rule of law. We plan to focus primarily on DOS Bureau of International Narcotics and Law Enforcement (INL) Justice Sector Support Program ( JSSP ...Specifically, (1) assess whether JSSP contractor(s) provided qualified trainers and services in accordance with the terms of the contract(s); (2...and USAID justice sector training efforts and determine the extent to which these programs complement the JSSP . (Project: SIGAR-073A) Dec-12 Oct-13
The South Eastern Europe Brigade: An Option for NATO-Led Peace Support Operations?
2011-06-10
Exercise CSSB Combat Service Support Battalion DOS Day of Supply DRO Disaster Relief Operations EOD Explosive Ordnance Disposal ETF Engineer Task...the adoption of the second Additional Protocol, the SEEBRIG member nations established an Engineer Task Force ( ETF ). The concept embeds purpose...capabilities, like the ETF structure, could be used as niche military capabilities by outside organizations that may need them. SEEBRIG engineer capabilities
Lee, Im-Yeong
2014-01-01
Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search. PMID:24693240
Lee, Sun-Ho; Lee, Im-Yeong
2014-01-01
Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.
Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen
2015-01-01
Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.
Chaudhry, Shehzad Ashraf; Naqvi, Husnain; Shon, Taeshik; Sher, Muhammad; Farash, Mohammad Sabzinejad
2015-06-01
Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
...The U.S. Department of Commerce and U.S. Department of Homeland Security are requesting information on the requirements of, and possible approaches to creating, a voluntary industry code of conduct to address the detection, notification and mitigation of botnets.\\1\\ Over the past several years, botnets have increasingly put computer owners at risk. A botnet infection can lead to the monitoring of a consumer's personal information and communication, and exploitation of that consumer's computing power and Internet access. Networks of these compromised computers are often used to disseminate spam, to store and transfer illegal content, and to attack the servers of government and private entities with massive, distributed denial of service attacks. The Departments seek public comment from all Internet stakeholders, including the commercial, academic, and civil society sectors, on potential models for detection, notification, prevention, and mitigation of botnets' illicit use of computer equipment. ---------------------------------------------------------------------------
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan
2016-11-01
Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.
An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity
NASA Astrophysics Data System (ADS)
Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.
2017-08-01
For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.
The September 11 attack: A percolation of individual passive support
NASA Astrophysics Data System (ADS)
Galam, S.
2002-04-01
A model to terrorism is presented using the theory of percolation. Terrorism power is related to the spontaneous formation of random backbones of people who are sympathetic to terrorism but without being directly involved in it. They just don't oppose in case they could. In the past such friendly-to-terrorism backbones have been always existing but were of finite size and localized to a given geographical area. The September 11 terrorist attack on the US has revealed for the first time the existence of a world wide spread extension. It is argued to have result from a sudden world percolation of otherwise unconnected and dormant world spread backbones of passive supporters. The associated strategic question is then to determine if collecting ground information could have predict and thus avoid such a transition. Our results show the answer is no, voiding the major criticism against intelligence services. To conclude the impact of military action is discussed.
DiGrande, Laura; Perrin, Megan A; Thorpe, Lorna E; Thalji, Lisa; Murphy, Joseph; Wu, David; Farfel, Mark; Brackbill, Robert M
2008-06-01
Manhattan residents living near the World Trade Center may have been particularly vulnerable to posttraumatic stress disorder (PTSD) after the September 11, 2001 (9/11) terrorist attacks. In 2003-2004, the authors administered the PTSD Checklist to 11,037 adults who lived south of Canal Street in New York City on 9/11. The prevalence of probable PTSD was 12.6% and associated with older age, female gender, Hispanic ethnicity, low education and income, and divorce. Injury, witnessing horror, and dust cloud exposure on 9/11 increased risk for chronic PTSD. Postdisaster risk factors included evacuation and rescue and recovery work. The results indicate that PTSD is a continued health problem in the local community. The relationship between socioeconomic status and PTSD suggests services must target marginalized populations. Followup is necessary on the course and long-term consequences of PTSD.
Video watermarking for mobile phone applications
NASA Astrophysics Data System (ADS)
Mitrea, M.; Duta, S.; Petrescu, M.; Preteux, F.
2005-08-01
Nowadays, alongside with the traditional voice signal, music, video, and 3D characters tend to become common data to be run, stored and/or processed on mobile phones. Hence, to protect their related intellectual property rights also becomes a crucial issue. The video sequences involved in such applications are generally coded at very low bit rates. The present paper starts by presenting an accurate statistical investigation on such a video as well as on a very dangerous attack (the StirMark attack). The obtained results are turned into practice when adapting a spread spectrum watermarking method to such applications. The informed watermarking approach was also considered: an outstanding method belonging to this paradigm has been adapted and re evaluated under the low rate video constraint. The experimental results were conducted in collaboration with the SFR mobile services provider in France. They also allow a comparison between the spread spectrum and informed embedding techniques.
Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram
2014-06-01
Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.
Security Issues in mGovernment
NASA Astrophysics Data System (ADS)
Kumar, Manish; Hanumanthappa, M.; Reddy, Bhavanam Lakshma
E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the government domain attempt to take the next step and exploit the latest wireless technologies in order to provide ubiquitous services for mobile users. However, this approach involves some hidden risks mainly due to the inherent insecurity of the air medium and the vulnerabilities of the wireless systems. Thus, in this paper we investigate the security gaps and considerations which should be taken into account for an m-government system. Finally, we provide a list of security guidelines and policies, which the users of the system should be aware of and follow in order to avoid security attacks.