Sample records for attack detection toolkit

  1. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber...

  2. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Broader source: Energy.gov (indexed) [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection...

  3. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31T23:59:59.000Z

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  4. CAT A Practical SDL Based Attack Attribution Toolkit for 3G Networks

    E-Print Network [OSTI]

    Yener, Aylin

    CAT ­ A Practical SDL Based Attack Attribution Toolkit for 3G Networks Kameswari Kotapati Peng Liu University University Park, PA 16802 Abstract-- This paper presents the Cross Infrastructure Attack telecommunication specifications. CAT analyzes vulnerabilities by generating attack graphs, which show the global

  5. A "Poisoning" Attack Against Online Anomaly Detection

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    A "Poisoning" Attack Against Online Anomaly Detection Marius Kloft Department of Computer Science it is robust against targeted "poisoning" attacks. The latter have been first investigated by Nelson et al. [1 of all data points observed so far. The key idea of a poisoning attack is to insert specially crafted

  6. Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

  7. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy, OAPM | Department of Energy Current5 by ISA -

  8. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,OfficeEnd ofEvaluations in Covered Facilities | DepartmentFactLead-acidofCyber

  9. Architectural Support for Automated Software Attack Detection, Recovery, and Prevention

    E-Print Network [OSTI]

    Zambreno, Joseph A.

    Architectural Support for Automated Software Attack Detection, Recovery, and Prevention Jesse University Ames, IA 50011, USA Email: {jsathre, abaumgar, zambreno}@iastate.edu Abstract--Attacks on software systems architecture aimed at attack detection. Traditional techniques ignore the arguably more important

  10. Real-world Polymorphic Attack Detection Michalis Polychronakis,1

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    proposed network-level emulation, a heuristic detection method that scans network traffic to detect, sophisticated obfuscation schemes. Keywords Polymorphism, intrusion detection, code emulation 1. Introduction them under control for as long as possible. As detection mechanisms improve, attackers employ

  11. WHOP: Wormhole Attack Detection Protocol using Hound Packet

    E-Print Network [OSTI]

    Dharmaraja, S.

    WHOP: Wormhole Attack Detection Protocol using Hound Packet Saurabh Gupta Indian Institute infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack

  12. Attack Detection and Identification in Cyber-Physical Systems

    E-Print Network [OSTI]

    Bullo, Francesco

    Attack Detection and Identification in Cyber-Physical Systems Fabio Pasqualetti, Florian D of unforeseen failures and external malicious attacks. In this paper (i) we propose a mathematical framework for cyber- physical systems, attacks, and monitors; (ii) we characterize fundamental monitoring limitations

  13. Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008

    E-Print Network [OSTI]

    Carle, Georg; Dressler, Falko; Kemmerer, Richard A.; Koenig, Hartmut; Kruegel, Christopher; Laskov, Pavel

    2009-01-01T23:59:59.000Z

    y REGULÄRE BEITRÄGE Network attack detection and defense –Perspective Workshop Network Attack Detection and Defensefor the detection of network attacks, should more strongly

  14. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we precisely define corrupted packets in inter-session pollution based

  15. On Detecting Pollution Attacks in Inter-Session Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine {anh.le, athina}@uci.edu Abstract--Dealing with pollution attacks in inter be malicious. In this work, we first define precisely corrupted packets in inter-session pollution based

  16. Energy-Based Attack Detection in Networked Control Emeka Eyisi

    E-Print Network [OSTI]

    Koutsoukos, Xenofon D.

    systems includ- ing medical devices [13] and waste water treatment plants [1]. In securing CPSEnergy-Based Attack Detection in Networked Control Systems Emeka Eyisi United Technologies Research.koutsoukos@vanderbilt.edu ABSTRACT The increased prevalence of attacks on Cyber-Physical Systems (CPS) as well as the safety

  17. MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT

    E-Print Network [OSTI]

    Noel, Steven

    MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects security, Intrusion detection, data mining 1. Introduction The goal of intrusion detection is to discover

  18. From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic

    E-Print Network [OSTI]

    Wang, Wenye

    From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce

  19. Predictive analysis of concealed social network activities based on communication technology choices: early-warning detection of attack signals from terrorist organizations

    E-Print Network [OSTI]

    Drozdova, Katya; Samoilov, Michael

    2010-01-01T23:59:59.000Z

    early-warning detection of attack signals from terroristtowards detecting terrorist attack precursors. We ?nd thatof impending terrorist attacks. (Such potential practical

  20. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design

    E-Print Network [OSTI]

    Pasqualetti, Fabio; Bullo, Francesco

    2012-01-01T23:59:59.000Z

    Cyber-physical systems integrate computation, communication, and physical capabilities to interact with the physical world and humans. Besides failures of components, cyber-physical systems are prone to malicious attacks so that specific analysis tools and monitoring mechanisms need to be developed to enforce system security and reliability. This paper builds upon the results presented in our companion paper [1] and proposes centralized and distributed monitors for attack detection and identification. First, we design optimal centralized attack detection and identification monitors. Optimality refers to the ability of detecting (respectively identifying) every detectable (respectively identifiable) attack. Second, we design an optimal distributed attack detection filter based upon a waveform relaxation technique. Third, we show that the attack identification problem is computationally hard, and we design a sub-optimal distributed attack identification procedure with performance guarantees. Finally, we illustr...

  1. Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach

    E-Print Network [OSTI]

    Bullo, Francesco

    Distributed Detection of Cyber-Physical Attacks in Power Networks: A Waveform Relaxation Approach to operate safely and reliably against cyber-physical attacks. The large dimensionality and the difficulty system and cyber- physical attacks as unknown inputs. This modeling framework captures, for instance

  2. Hearing is Believing: Detecting Wireless Microphone Emulation Attack in White Space

    E-Print Network [OSTI]

    California at Davis, University of

    users from transmitting. Such an attack is called primary user emulation (PUE) attack. TV towers and their transmission power is low. These properties introduce great challenges on PUE detection and existing meth- ods]. However, all of them focus on the attackers that emulate stationary primary users (TV towers

  3. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout » Contact UsDepartment of Energy Cut Gas

  4. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJuly 30,Crafty Gifts forHeavy-Duty| DepartmentAirPortaledge,May

  5. ON-LINE DETECTION OF DISTRIBUTED ATTACKS FROM SPACE-TIME NETWORK FLOW PATTERNS

    E-Print Network [OSTI]

    Baras, John S.

    ON-LINE DETECTION OF DISTRIBUTED ATTACKS FROM SPACE-TIME NETWORK FLOW PATTERNS J.S. Baras* , A in the network. We are interested in the "quickest detection" problem when the attack is distributed is to detect when a distributed denial of service is taking place in one sub-network of a transit (core

  6. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines

    E-Print Network [OSTI]

    Shilton, Alistair

    concerning energy . In this article, we propose a centralized intrusion detection scheme based on SupportDetecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines Vector Machines (SVMs) and sliding windows. We find that our system can detect black hole attacks

  7. Survey of Event Correlation Techniques for Attack Detection in Early Warning Systems

    E-Print Network [OSTI]

    Breu, Ruth

    Survey of Event Correlation Techniques for Attack Detection in Early Warning Systems Tobias Limmer of early warning systems for detecting Internet worms and other attacks, event correlation techniques on early warning systems. We summarize and clarify the typical terminology used in this context and present

  8. WADeS: a tool for Distributed Denial of Service Attack detection

    E-Print Network [OSTI]

    Ramanathan, Anu

    2002-01-01T23:59:59.000Z

    's resources and denying service to legitimate users. In our research work, we propose WADeS (Wavelet based Attack Detection Signatures), an approach to detect a Distributed Denial of Service Attack using Wavelet methods. We develop a new framework that uses...

  9. attack detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is presented Autonoma de Madrid, Universidad 51 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  10. Hearing is Believing: Detecting Mobile Primary User Emulation Attack in White Space

    E-Print Network [OSTI]

    California at Davis, University of

    users in white space: TV towers and wireless microphones. Existing work on PUE attack detection focused on the first category. However, for the latter category, primary users are mobile and their transmission power on the attackers that emulate stationary primary users (TV towers). They are based on the fact that the locations

  11. Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning

    E-Print Network [OSTI]

    Noh, Sanguk

    Detecting Distributed Denial of Service (DDoS) Attacks Through Inductive Learning Sanguk Noh1 of Service (DDoS) flooding at- tacks on TCP-based Web servers. There has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them. However, none

  12. Detection, Correlation, and Visualization of Attacks Against Critical Infrastructure Systems

    E-Print Network [OSTI]

    Briesemeister, Linda

    . Modern control systems are increasingly connected to other control systems as well as to corporate.lastname@sri.com Abstract--Digital control systems are essential to the safe and efficient operation of a variety from conventional enterprise systems. These trends can make control systems vulnerable to cyber attack

  13. Detecting Sensitive Data Exfiltration by an Insider Attack Electrical & Computer Engineering

    E-Print Network [OSTI]

    California at Davis, University of

    1 Detecting Sensitive Data Exfiltration by an Insider Attack Yali Liu Electrical & Computer. By successfully implementing tactics to detect this threat, organizations avoid the loss of sensitive information of sensitive information. A key technical challenge is detection despite transformations being applied

  14. On the Limits of Payload-Oblivious Network Attack Detection

    E-Print Network [OSTI]

    Reiter, Michael

    alarms in order to detect them consistently. Keywords: network intrusion detection, ROC curve, evaluation. 1 Introduction We address the problem of evaluating network intrusion detection systems to the form of log data, encryption or simply a high connection failure rate--methods for detecting

  15. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22T23:59:59.000Z

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  16. Sensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks

    E-Print Network [OSTI]

    Levi, Albert

    network are discussed in [7]. Security, network bandwidth and power consumption in sensor networksSensor Wars: Detecting and Defending Against Spam Attacks in Wireless Sensor Networks Serdar Sancak@sabanciuniv.edu Abstract--Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets

  17. Insider Attacker Detection in Wireless Sensor Fang Liu & Xiuzhen Cheng

    E-Print Network [OSTI]

    Cheng, Xiuzhen "Susan"

    to be low-cost and lack of tamper resistance. The compromise or capture of a sensor releases all the intrusion detection techniques developed for a fixed wired network. A typical low-cost sensor has limited working towards securing sensor networks in the fields of pairwise key establishment [13

  18. Energy & Society Toolkit Appendices Toolkit Appendices

    E-Print Network [OSTI]

    Kammen, Daniel M.

    ton of coal 1,000,000,000 GJ = 1 exajoule = 1 quad Reference energy measure: watt (W) 70 gigawatts (GWEnergy & Society Toolkit Appendices 1 Toolkit Appendices #12;Energy & Society Toolkit Appendices 2 2.3. Volume 4 2.4. Mass 4 2.5. Pressure 4 2.6. Temperature 4 2.7. Force 4 2.8. Energy 4 2.9. Power 5

  19. Alternative energy design toolkit

    E-Print Network [OSTI]

    Sukkasi, Sittha

    2004-01-01T23:59:59.000Z

    This thesis concerns the concepts, structure, and applications of the Alternative Energy Design Toolkit. The toolkit is aimed to provide a widely accessible, easy to use, flexible, yet powerful modeling environment for ...

  20. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29T23:59:59.000Z

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully

  1. Time Synchronization Attack in Smart Grid-Part II: Cross Layer Detection Mechanism

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01T23:59:59.000Z

    A novel time synchronization attack (TSA) on wide area monitoring systems in smart grid has been identified in the first part of this paper. A cross layer detection mechanism is proposed to combat TSA in part II of this paper. In the physical layer, we propose a GPS carrier signal noise ratio (C/No) based spoofing detection technique. In addition, a patch-monopole hybrid antenna is applied to receive GPS signal. By computing the standard deviation of the C/No difference from two GPS receivers, a priori probability of spoofing detection is fed to the upper layer, where power system state is estimated and controlled. A trustworthiness based evaluation method is applied to identify the PMU being under TSA. Both the physical layer and upper layer algorithms are integrated to detect the TSA, thus forming a cross layer mechanism. Experiment is carried out to verify the effectiveness of the proposed TSA detection algorithm.

  2. TOOLKIT, Version 2. 0

    SciTech Connect (OSTI)

    Schroeder, E.; Bagot, B.; McNeill, R.L.

    1990-05-09T23:59:59.000Z

    The purpose of this User's Guide is to show by example many of the features of Toolkit II. Some examples will be copies of screens as they appear while running the Toolkit. Other examples will show what the user should enter in various situations; in these instances, what the computer asserts will be in boldface and what the user responds will be in regular type. The User's Guide is divided into four sections. The first section, FOCUS Databases'', will give a broad overview of the Focus administrative databases that are available on the VAX; easy-to-use reports are available for most of them in the Toolkit. The second section, Getting Started'', will cover the steps necessary to log onto the Computer Center VAX cluster and how to start Focus and the Toolkit. The third section, Using the Toolkit'', will discuss some of the features in the Toolkit -- the available reports and how to access them, as well as some utilities. The fourth section, Helpful Hints'', will cover some useful facts about the VAX and Focus as well as some of the more common problems that can occur. The Toolkit is not set in concrete but is continually being revised and improved. If you have any opinions as to changes that you would like to see made to the Toolkit or new features that you would like included, please let us know. Since we do try to respond to the needs of the user and make periodic improvement to the Toolkit, this User's Guide may not correspond exactly to what is available in the computer. In general, changes are made to provide new options or features; rarely is an existing feature deleted.

  3. A Stateful Web Augmentation Toolkit

    E-Print Network [OSTI]

    Webber, Matthew J. (Matthew James)

    2010-01-01T23:59:59.000Z

    This thesis introduces the Stateful Web Augmentation Toolkit (SWAT), a toolkit that gives users control over the presentation and functionality of web content. SWAT extends Chickenfoot, a Firefox browser scripting environment ...

  4. The model coupling toolkit.

    SciTech Connect (OSTI)

    Larson, J. W.; Jacob, R. L.; Foster, I.; Guo, J.

    2001-04-13T23:59:59.000Z

    The advent of coupled earth system models has raised an important question in parallel computing: What is the most effective method for coupling many parallel models to form a high-performance coupled modeling system? We present our solution to this problem--The Model Coupling Toolkit (MCT). We explain how our effort to construct the Next-Generation Coupler for NCAR Community Climate System Model motivated us to create this toolkit. We describe in detail the conceptual design of the MCT and explain its usage in constructing parallel coupled models. We present preliminary performance results for the toolkit's parallel data transfer facilities. Finally, we outline an agenda for future development of the MCT.

  5. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect (OSTI)

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01T23:59:59.000Z

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  6. An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems

    E-Print Network [OSTI]

    Sanandaji, Borhan M.

    hardware and software components such as smart meters, Phasor Measurement Units (PMUs), intelligent Borhan dynamics have been traditionally considered as a result of meter aging and malfunctioning, electrical of a designated cyber data attack to the system. In particular, with the emergence of smart grids and its smart

  7. Resilient Detection in the Presence of Integrity Attacks , Jo~ao Hespanha

    E-Print Network [OSTI]

    Hespanha, Joăo Pedro

    critical plants and processes, including manufacturing, water and gas treatment and This researchReview Only 2 distribution, facility control and power grids. A successful attack to such kind of systems may infrastructures susceptible to cyber security threats. The research community has acknowledged the importance

  8. Voluntary Initiative on Incentives: Toolkit Training Webinar...

    Energy Savers [EERE]

    Voluntary Initiative on Incentives: Toolkit Training Webinar Voluntary Initiative on Incentives: Toolkit Training Webinar March 26, 2015 12:30PM to 2:0...

  9. Change-Point Monitoring for Detection of DoS Attacks Haining Wang Danlu Zhang Kang G. Shin

    E-Print Network [OSTI]

    Wang, Haining

    . The statelessness and low computation overhead of CPM make itself immune to any flooding attacks. As a case study of service (DDoS) attack. Briefly, a DDoS attack works as follows. An attacker sends control packets victim servers or link bandwidth from DoS traffic, and block the prorogation of DDoS traffic at routers

  10. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Attack and Detection in Smart Grid,” to appear in IEEE

  11. Application experiences with the Globus toolkit.

    SciTech Connect (OSTI)

    Brunett, S.

    1998-06-09T23:59:59.000Z

    The Globus grid toolkit is a collection of software components designed to support the development of applications for high-performance distributed computing environments, or ''computational grids'' [14]. The Globus toolkit is an implementation of a ''bag of services'' architecture, which provides application and tool developers not with a monolithic system but rather with a set of stand-alone services. Each Globus component provides a basic service, such as authentication, resource allocation, information, communication, fault detection, and remote data access. Different applications and tools can combine these services in different ways to construct ''grid-enabled'' systems. The Globus toolkit has been used to construct the Globus Ubiquitous Supercomputing Testbed, or GUSTO: a large-scale testbed spanning 20 sites and included over 4000 compute nodes for a total compute power of over 2 TFLOPS. Over the past six months, we and others have used this testbed to conduct a variety of application experiments, including multi-user collaborative environments (tele-immersion), computational steering, distributed supercomputing, and high throughput computing. The goal of this paper is to review what has been learned from these experiments regarding the effectiveness of the toolkit approach. To this end, we describe two of the application experiments in detail, noting what worked well and what worked less well. The two applications are a distributed supercomputing application, SF-Express, in which multiple supercomputers are harnessed to perform large distributed interactive simulations; and a tele-immersion application, CAVERNsoft, in which the focus is on connecting multiple people to a distributed simulated world.

  12. An Adaptive Sampling Algorithm with Applications to Denial-of-Service Attack Detection

    E-Print Network [OSTI]

    -- There is an emerging need for the traffic processing capability of network security mechanisms, such as intrusion-based security systems, like intrusion detection systems (IDS), have not kept pace with the increasing usage that can be attributed to the incapability of current solutions to detect intrusions in high- speed

  13. SRID: State Relation based Intrusion Detection for False Data Injection Attacks in SCADA

    E-Print Network [OSTI]

    Gu, Guofei

    , College Station, Texas, USA 2 Department of Information Security, Shanghai University of Electric Power with a real-world power plant simulator. The experiment results show that SRID can detect various false data] worm spread across Iran nuclear infrastructure and occupied the headline of news and media, we

  14. toolkit computational mesh conceptual model.

    SciTech Connect (OSTI)

    Baur, David G.; Edwards, Harold Carter; Cochran, William K.; Williams, Alan B.; Sjaardema, Gregory D.

    2010-03-01T23:59:59.000Z

    The Sierra Toolkit computational mesh is a software library intended to support massively parallel multi-physics computations on dynamically changing unstructured meshes. This domain of intended use is inherently complex due to distributed memory parallelism, parallel scalability, heterogeneity of physics, heterogeneous discretization of an unstructured mesh, and runtime adaptation of the mesh. Management of this inherent complexity begins with a conceptual analysis and modeling of this domain of intended use; i.e., development of a domain model. The Sierra Toolkit computational mesh software library is designed and implemented based upon this domain model. Software developers using, maintaining, or extending the Sierra Toolkit computational mesh library must be familiar with the concepts/domain model presented in this report.

  15. Outbreak Ethnography The Anthropologist's Toolkit

    E-Print Network [OSTI]

    a diverse toolkit. And while it is very useful to be an empathetic listener and hang out with people in many and professional lives--finding people to care for our children and cover our university classes--in addition living intimately with local people and participating, observing, and talking with people in a variety

  16. Groupware Toolkits for Synchronous Work

    E-Print Network [OSTI]

    Greenberg, Saul

    sessions. A set of groupware programming abstractions allows develop- ers to control the behaviour's work- ing style. We illustrate the many ways these components can be designed by drawing on our own conventional single-user GUI toolkits are available, implementing even the simplest systems can be lengthy

  17. Geospatial Toolkit Help October 2010

    E-Print Network [OSTI]

    is integrated with HOMER, a power system simulation and optimization model, originally developed at NREL a saved query, 26 Remove a query, 26 Troubleshoot a query, 27 Renewable resource data, 28 Geographic toolkit data in your own GIS, 36 File format reference, 37 Glossary, 37 © 2010 National Renewable

  18. Detection and Identification of Data Attacks in Power System Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    critically on the proper operation of the electric power distribution and transmission system, which measure data such as transmission line power flows, bus power injections and part of the bus voltages the attacked transmission lines. I. INTRODUCTION A. SCADA System and State Estimation A modern society relies

  19. Campus Toolkit What goes around comes around

    E-Print Network [OSTI]

    to as gasification, pyrolysis, waste to energy, biomass burners and Zero Waste to landfill. This has been touted2 ZERO WASTE Campus Toolkit What goes around comes around #12;#12;1 Zero Waste Campus Toolkit Campus Zero Waste Program. Graphics and formatting by Charles Taylor-Love and Alex Fallenstedt

  20. Waste Toolkit A-Z Plastic Grundon

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Plastic ­ Grundon Also see `Swap Shop' and `Office Recycling ­ Grundon' in the Waste Toolkit A-Z How can I recycle plastic? There are lots of different types of plastic. Typically, waste contractors can only recycle PETE plastic and HDPE plastic. The University's preferred waste

  1. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJumpGermanFifeGEXAGarnet VRXRate-MakingConferenceToolkit

  2. TECA: A Parallel Toolkit for Extreme Climate Analysis

    SciTech Connect (OSTI)

    Prabhat, Mr; Ruebel, Oliver; Byna, Surendra; Wu, Kesheng; Li, Fuyu; Wehner, Michael; Bethel, E. Wes

    2012-03-12T23:59:59.000Z

    We present TECA, a parallel toolkit for detecting extreme events in large climate datasets. Modern climate datasets expose parallelism across a number of dimensions: spatial locations, timesteps and ensemble members. We design TECA to exploit these modes of parallelism and demonstrate a prototype implementation for detecting and tracking three classes of extreme events: tropical cyclones, extra-tropical cyclones and atmospheric rivers. We process a modern TB-sized CAM5 simulation dataset with TECA, and demonstrate good runtime performance for the three case studies.

  3. A Toolkit for Building Sustainability at Dartmouth

    E-Print Network [OSTI]

    working groups to focus sustainability in particular areas of the Dartmouth community, namely, Energy1 A Toolkit for Building Sustainability at Dartmouth Environmental Studies 50, Spring 2011.............................................................................7 Chapter II: Sustainability within Dartmouth Sub

  4. TOOLKIT

    E-Print Network [OSTI]

    Schroeder, E.

    2010-01-01T23:59:59.000Z

    B. Logging on the VAX C. Starting Focus IIio Using theA. Useful VAX/FocusIBM computers, the scientific VAX cluster, and the growing

  5. TOOLKIT

    E-Print Network [OSTI]

    Schroeder, E.

    2010-01-01T23:59:59.000Z

    Hot Screen Command Line Commands Command Description toptype 'help command>' atthe csalprompt on-line e.g. , dir'on-line withthedh" help commahd. FocusCommands Command ex

  6. (Distributed Object Group Framework) Tool-Kit . Tool-Kit DOGF

    E-Print Network [OSTI]

    Joo, Su-Chong

    1351 (Distributed Object Group Framework) Tool-Kit . Tool-Kit DOGF GUI, GUI, GUI 3 GUI . , , . Tool Group Services DistributedApplications DistributedObjectGroup Framework REAL-TIME MANAGER OBJECT SCHEDULER OBJECT REAL-TIMESERVICES Objects OBJECTMANAGEMENTSERVICES DistributedReal-time Applications

  7. Comparison of open source visual analytics toolkits.

    SciTech Connect (OSTI)

    Crossno, Patricia Joyce; Harger, John R.

    2010-11-01T23:59:59.000Z

    We present the results of the first stage of a two-stage evaluation of open source visual analytics packages. This stage is a broad feature comparison over a range of open source toolkits. Although we had originally intended to restrict ourselves to comparing visual analytics toolkits, we quickly found that very few were available. So we expanded our study to include information visualization, graph analysis, and statistical packages. We examine three aspects of each toolkit: visualization functions, analysis capabilities, and development environments. With respect to development environments, we look at platforms, language bindings, multi-threading/parallelism, user interface frameworks, ease of installation, documentation, and whether the package is still being actively developed.

  8. On attack correlation and the benefits of sharing IDS data

    E-Print Network [OSTI]

    Katti, Sachin (Katti Rajsekhar)

    2005-01-01T23:59:59.000Z

    This thesis presents the first wide-scale study of correlated attacks, i.e., attacks mounted by the same source IP against different networks. Using a large dataset from 1700 intrusion detection systems (IDSs), this thesis ...

  9. Stealthy Deception Attacks on Water SCADA Systems

    E-Print Network [OSTI]

    Hu, Fei

    Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin1 Xavier Litrico2 Alexandre M. Bayen1 The Gignac Water SCADA System Modeling of Cascade Canal Pools Attacks on PI Control Limits on Stability and Detectability #12;Recapitulation from last year The Gignac Water SCADA System Modeling of Cascade Canal Pools

  10. Waste Toolkit A-Z Battery recycling

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Battery recycling How can I recycle batteries? The University Safety Office is responsible for arranging battery recycling for departments (see Contact at bottom of page). Colleges must in normal waste bins or recycling boxes. To recycle batteries, select either option 1 or 2 below: Option 1

  11. Multimedia Statistical Labs & Toolkit (TILE) Deborah Nolan

    E-Print Network [OSTI]

    Nolan, Deborah

    Multimedia Statistical Labs & Toolkit (TILE) Deborah Nolan University of California, Department@research.bell-labs.com 1. Introduction The potential for multimedia to enhance the statistics curriculum is clear, but how to develop instructional materials that take advantage of the riches that multimedia has to offer

  12. Waste Toolkit A-Z Plastic bags

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Plastic bags Can I recycle plastic bags? No. At the moment you can't recycle plastic bags in the University recycling. Instead, choose alternatives to plastic bags when shopping have to use a cotton bag 131 times to ensure it has lower global warming potential than a plastic

  13. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01T23:59:59.000Z

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth's weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  14. A toolkit for building earth system models

    SciTech Connect (OSTI)

    Foster, I.

    1993-03-01T23:59:59.000Z

    An earth system model is a computer code designed to simulate the interrelated processes that determine the earth`s weather and climate, such as atmospheric circulation, atmospheric physics, atmospheric chemistry, oceanic circulation, and biosphere. I propose a toolkit that would support a modular, or object-oriented, approach to the implementation of such models.

  15. Waste Toolkit A-Z Mobile phones

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Mobile phones How to recycle your mobile phone Recycling your mobile phone makes the deep forests in the Congo in central Africa. The Congo's mining business has in recent years led and recycling can help to reduce the demand for new raw materials. Do not put mobile phones in the recycling

  16. Waste Toolkit A-Z Light bulbs

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Light bulbs Can I recycle light bulbs? It depends what type of bulbs you have of in the normal University waste bins (landfill waste). Energy saving bulbs and fluorescent tubes are classified light bulbs? Standard filament bulbs Put in the waste bin (landfill waste) as these are not classified

  17. Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs

    E-Print Network [OSTI]

    Noel, Steven

    1 Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs Steven Noel and Sushil optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph. The set of all such paths through the network constitutes an attack graph, which we aggregate according

  18. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Against Data Injection Attacks on Power Grids”, IEEER. Thomas, and L. Tong, “Malicious Data Attacks on SmartState Estimation: Attack Strategies and Countermeasures,”

  19. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    Data Injection Attacks on Power Grids”, IEEE Transactionson Smart Grid, vol. 2, no. 2, June [21] O. Kosut, L.Data Attacks on Smart Grid State Estimation: Attack

  20. Guidelines and Toolkits for Urban Transport Development in Medium...

    Open Energy Info (EERE)

    Structure Topics: Best Practices ComplexityEase of Use: Not Available Website: sti-india-uttoolkit.adb.org Transport Toolkit Region(s): Asia Related Tools Key Mobility...

  1. Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)

    SciTech Connect (OSTI)

    Young, K.

    2014-04-01T23:59:59.000Z

    Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

  2. Optimization Online - TACO - A Toolkit for AMPL Control Optimization

    E-Print Network [OSTI]

    Christian Kirches

    2011-11-07T23:59:59.000Z

    Nov 7, 2011 ... ... optimal control problems for ODE or DAE dynamic processes. ... This toolkit is designed to facilitate the coupling of existing optimal control ...

  3. Knowledge information management toolkit and method

    DOE Patents [OSTI]

    Hempstead, Antoinette R.; Brown, Kenneth L.

    2006-08-15T23:59:59.000Z

    A system is provided for managing user entry and/or modification of knowledge information into a knowledge base file having an integrator support component and a data source access support component. The system includes processing circuitry, memory, a user interface, and a knowledge base toolkit. The memory communicates with the processing circuitry and is configured to store at least one knowledge base. The user interface communicates with the processing circuitry and is configured for user entry and/or modification of knowledge pieces within a knowledge base. The knowledge base toolkit is configured for converting knowledge in at least one knowledge base from a first knowledge base form into a second knowledge base form. A method is also provided.

  4. active attack tegutsevad: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    traffic. Although it is difficult to detect shrew DDo Chen, Yu 83 Timing analysis in low-latency mix networks: attacks and defenses Computer Technologies and Information Sciences...

  5. Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response

    E-Print Network [OSTI]

    Noel, Steven

    1 Attack Graphs for Sensor Placement, Alert Prioritization, and Attack Response Steven Noel of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways and attacker exploits provides an attack graph showing all possible paths to critical assets. We then place IDS

  6. A Sonically-Enhanced Interface Toolkit Stephen A. Brewster

    E-Print Network [OSTI]

    Williamson, John

    in that an interface designer without a detailed knowledge of graphic design can create an interface using a standard device-dependent and time- consuming. This is a similar problem to that faced by graphical interface designers before graphical toolkits were available. Myers [8] suggests that the use of graphical toolkits

  7. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01T23:59:59.000Z

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  8. Attack Diagnosis: Throttling Distributed Denial-of-Service Attacks Close to the Attack Sources

    E-Print Network [OSTI]

    Park, Jung-Min

    Attack Diagnosis: Throttling Distributed Denial- of-Service Attacks Close to the Attack Sources Polytechnic Institute and State University Blacksburg, VA 24061 {rlchen, jungmin}@vt.edu Abstract-- Attack mitigation schemes actively throttle attack traffic generated in Distributed Denial-of-Service (DDoS) attacks

  9. Robust Codes for Fault Attack Resistant Cryptographic Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin

    E-Print Network [OSTI]

    Karpovsky, Mark

    Robust Codes for Fault Attack Resistant Cryptographic Hardware Konrad J. Kulikowski, Mark G algorithms are vulner- able to fault analysis attacks. To detect these attacks we propose an architec- ture by an attacker. Architectures based on these codes have fewer undetectable er- rors than linear codes

  10. Graph algorithms in the titan toolkit.

    SciTech Connect (OSTI)

    McLendon, William Clarence, III; Wylie, Brian Neil

    2009-10-01T23:59:59.000Z

    Graph algorithms are a key component in a wide variety of intelligence analysis activities. The Graph-Based Informatics for Non-Proliferation and Counter-Terrorism project addresses the critical need of making these graph algorithms accessible to Sandia analysts in a manner that is both intuitive and effective. Specifically we describe the design and implementation of an open source toolkit for doing graph analysis, informatics, and visualization that provides Sandia with novel analysis capability for non-proliferation and counter-terrorism.

  11. An Incident Management Preparedness and Coordination Toolkit

    SciTech Connect (OSTI)

    Koch, Daniel B [ORNL; Payne, Patricia W [ORNL

    2012-01-01T23:59:59.000Z

    Although the use of Geographic Information Systems (GIS) by centrally-located operations staff is well established in the area of emergency response, utilization by first responders in the field is uneven. Cost, complexity, and connectivity are often the deciding factors preventing wider adoption. For the past several years, Oak Ridge National Laboratory (ORNL) has been developing a mobile GIS solution using free and open-source software targeting the needs of front-line personnel. Termed IMPACT, for Incident Management Preparedness and Coordination Toolkit, this ORNL application can complement existing GIS infrastructure and extend its power and capabilities to responders first on the scene of a natural or man-made disaster.

  12. LEDS Toolkit and Framework | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |Jilin Zhongdiantou NewKorea Parts andKunshanGroup NamesourceToolkit and

  13. Quantum-Space Attacks

    E-Print Network [OSTI]

    Ran Gelles; Tal Mor

    2007-11-25T23:59:59.000Z

    Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security can still be proved in some very special cases, a general framework that considers such realistic QKD protocols, as well as} attacks on such protocols, is still missing. We describe a general method of attacking realistic QKD protocols, which we call the `quantum-space attack'. The description is based on assessing the enlarged quantum space actually used by a protocol, the `quantum space of the protocol'. We demonstrate these new methods by classifying various (known) recent attacks against several QKD schemes, and by analyzing a novel attack on interferometry-based QKD.

  14. Building Computer Network Attacks

    E-Print Network [OSTI]

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01T23:59:59.000Z

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  15. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    E-Print Network [OSTI]

    Ou, Xinming "Simon"

    Improving Attack Graph Visualization through Data Reduction and Attack Grouping John Homer1 Laboratory, USA Abstract. Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often

  16. The Best Ever Alarm System Toolkit

    SciTech Connect (OSTI)

    Kasemir, Kay [ORNL; Chen, Xihui [ORNL; Danilova, Katia [ORNL

    2009-01-01T23:59:59.000Z

    Learning from our experience with the standard Experimental Physics and Industrial Control System (EPICS) alarm handler (ALH) as well as a similar intermediate approach based on script-generated operator screens, we developed the Best Ever Alarm System Toolkit (BEAST). It is based on Java and Eclipse on the Control System Studio (CSS) platform, using a relational database (RDB) to store the configuration and log actions. It employs a Java Message Service (JMS) for communication between the modular pieces of the toolkit, which include an Alarm Server to maintain the current alarm state, an arbitrary number of Alarm Client user interfaces (GUI), and tools to annunciate alarms or log alarm related actions. Web reports allow us to monitor the alarm system performance and spot deficiencies in the alarm configuration. The Alarm Client GUI not only gives the end users various ways to view alarms in tree and table, but also makes it easy to access the guidance information, the related operator displays and other CSS tools. It also allows online configuration to be simply modified from the GUI. Coupled with a good "alarm philosophy" on how to provide useful alarms, we can finally improve the configuration to achieve an effective alarm system.

  17. Sequential Defense Against Random and Intentional Attacks in Complex Networks

    E-Print Network [OSTI]

    Chen, Pin-Yu

    2015-01-01T23:59:59.000Z

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is firstly proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and valida...

  18. A Formal Method for Attack Modeling and Seyit Ahmet C amtepe and Bulent Yener

    E-Print Network [OSTI]

    Bystroff, Chris

    1 A Formal Method for Attack Modeling and Detection Seyit Ahmet C¸ amtepe and B¨ulent Yener,yener}@cs.rpi.edu TR-06-01 Abstract This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach [1] to capture (i

  19. Demonstration: interactive Social-Emotional Toolkit (iSET)

    E-Print Network [OSTI]

    Madsen, Miriam A.

    Social communication in autism is significantly hindered by difficulties processing affective cues in realtime face-to-face interaction. The interactive Social-Emotional Toolkit (iSET) allows its users to record and annotate ...

  20. Team Building Toolkit KEYS -Keys to Enhance Your Supervisory Success

    E-Print Network [OSTI]

    Walker, Matthew P.

    Team Building Toolkit KEYS - Keys to Enhance Your Supervisory Success University of California to Enhance Your Supervisory Success 2 | P a g e Table of Contents Stages of Team Development ................................................................................................ 4 Team Building at a Glance

  1. NOAA Webinar: The U.S. Climate Resilience Toolkit | Department...

    Broader source: Energy.gov (indexed) [DOE]

    to 2:30PM EDT Hosted by the National Oceanic and Atmospheric Administration (NOAA), this webinar will demonstrate the U.S. Climate Resilience Toolkit. Register for this webinar...

  2. accelerator modeling toolkit: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    model. Philip Clarkson; Ronald Rosenfeld 1997-01-01 5 A Toolkit for Building Earth System Models CiteSeer Summary: 1 1 Motivation 1 2 Programming Concepts 2 2.1 Processes : : :...

  3. Microarchitectural Attacks and Countermeasures

    E-Print Network [OSTI]

    Chapter 18 Microarchitectural Attacks and Countermeasures Onur Aciic¸mez and C¸ etin Kaya Koc¸ 18+Business Media, LLC 2009 475 #12;476 Onur Aciic¸mez and C¸ etin Kaya Koc¸ attention on analysis of computer

  4. Stealthy Poisoning Attacks on PCA-based Anomaly Detectors

    E-Print Network [OSTI]

    Tygar, Doug

    Stealthy Poisoning Attacks on PCA-based Anomaly Detectors Benjamin I. P. Rubinstein1 Blaine Nelson1 detection, we present and evaluate short-term and long-term data poison- ing schemes that trade-off between poisoning duration and the volume of traffic injected for poisoning. Stealthy Boil- ing Frog attacks

  5. SciTech Connect: Guide to Using the WIND Toolkit Validation Code

    Office of Scientific and Technical Information (OSTI)

    Toolkit Validation Code In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to...

  6. Development of Distributed Programming Developing Tool-Kit Based on Object Group Model

    E-Print Network [OSTI]

    Joo, Su-Chong

    Development of Distributed Programming Developing Tool-Kit Based on Object Group Model Jeong of the grouped distributed objects[10-14], as a logical unit of distributed application service, and developed a distributed programming developing tool-kit based on object group model(OGM-DPD Tool-Kit). This Tool- Kit can

  7. Security Assessment Simulation Toolkit (SAST) Final Report

    SciTech Connect (OSTI)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15T23:59:59.000Z

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  8. The accelerator automation application toolkit workshop presentations

    SciTech Connect (OSTI)

    Howell, J.A.; Bjorklund, E.A.; Clout, P.N.; Dalesio, L.R.; Kozubal, A.J.; Mottershead, C.T.; Rothrock, R.B.; Schaller, S.C.; Stuewe, R.B.; Westervelt, R.T.

    1988-01-01T23:59:59.000Z

    Over the past 18 months on the GTA project at Los Alamos, we have been developing tools for building control systems for accelerators. The first tool developed has already demonstrated greatly reduced requirements for conventional computer programming in applying control systems to an accelerator. Even in the early stages, this work has received considerable attention and the system is currently being investigated or used at several other institutes. Further tools are either in the conceptual design, design, or implementation phase. Over the same period, a group at CERN has been developing the ideas and design for a generic software kit for the application of a control system to accelerators. The CERN software kit also addresses the technical management and documentation aspects of control systems. The purpose of the AT Division effort and the CERN kit is to greatly simplify the implementation and lifetime maintenance of an accelerator control system. Experience has shown that accelerator control systems are also applicable to other experimental physics machines. The purpose of the workshop was to explore these ideas and developments as well as other relevant developments in the field, to verify the viability of the concepts, and to develop further the written specifications for some of the components of such a toolkit. We had draft specifications prepared prior to the workshop. 21 figs.

  9. DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks

    E-Print Network [OSTI]

    California at Davis, University of

    DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks Lihua Yuan ECE, UC Davis lyuan for more insidious attacks. This paper proposes DoX, a peer-to-peer based scheme, to detect and correct inaccurate DNS records caused by cache poisoning attacks. DoX also helps DNS servers to improve cache

  10. A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses

    E-Print Network [OSTI]

    Sundaram, Ravi

    , a common form of distributed denial of service (DDoS) attacks. In particular, our traffic injection game statistical methods for creating defense mechanisms that can detect a DDoS attack and that even when--changing the source address of IP packets-- has been used in DDoS attacks on popular websites (Ya- hoo!) and root DNS

  11. Validation of Power Output for the WIND Toolkit

    SciTech Connect (OSTI)

    King, J.; Clifton, A.; Hodge, B. M.

    2014-09-01T23:59:59.000Z

    Renewable energy integration studies require wind data sets of high quality with realistic representations of the variability, ramping characteristics, and forecast performance for current wind power plants. The Wind Integration National Data Set (WIND) Toolkit is meant to be an update for and expansion of the original data sets created for the weather years from 2004 through 2006 during the Western Wind and Solar Integration Study and the Eastern Wind Integration Study. The WIND Toolkit expands these data sets to include the entire continental United States, increasing the total number of sites represented, and it includes the weather years from 2007 through 2012. In addition, the WIND Toolkit has a finer resolution for both the temporal and geographic dimensions. Three separate data sets will be created: a meteorological data set, a wind power data set, and a forecast data set. This report describes the validation of the wind power data set.

  12. Geospatial Toolkits and Resource Maps for Selected Countries from the National Renewable Energy Laboratory (NREL)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    NREL developed the Geospatial Toolkit (GsT), a map-based software application that integrates resource data and geographic information systems (GIS) for integrated resource assessment. A variety of agencies within countries, along with global datasets, provided country-specific data. Originally developed in 2005, the Geospatial Toolkit was completely redesigned and re-released in November 2010 to provide a more modern, easier-to-use interface with considerably faster analytical querying capabilities. Toolkits are available for 21 countries and each one can be downloaded separately. The source code for the toolkit is also available. [Taken and edited from http://www.nrel.gov/international/geospatial_toolkits.html

  13. Network algorithms for information analysis using the Titan Toolkit.

    SciTech Connect (OSTI)

    McLendon, William Clarence, III; Baumes, Jeffrey (Kitware Inc., Clifton Park, NY); Wilson, Andrew T.; Wylie, Brian Neil; Shead, Timothy M.

    2010-07-01T23:59:59.000Z

    The analysis of networked activities is dramatically more challenging than many traditional kinds of analysis. A network is defined by a set of entities (people, organizations, banks, computers, etc.) linked by various types of relationships. These entities and relationships are often uninteresting alone, and only become significant in aggregate. The analysis and visualization of these networks is one of the driving factors behind the creation of the Titan Toolkit. Given the broad set of problem domains and the wide ranging databases in use by the information analysis community, the Titan Toolkit's flexible, component based pipeline provides an excellent platform for constructing specific combinations of network algorithms and visualizations.

  14. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL

    2014-01-01T23:59:59.000Z

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  15. Water Security Toolkit User Manual Version 1.2.

    SciTech Connect (OSTI)

    Klise, Katherine A.; Siirola, John Daniel; Hart, David; Hart, William E.; Phillips, Cynthia A.; Haxton, Terranna; Murray, Regan; Janke, Robert; Taxon, Thomas; Laird, Carl; Seth, Arpan; Hackebeil, Gabriel; McGee, Shawn; Mann, Angelica

    2014-08-01T23:59:59.000Z

    The Water Security Toolkit (WST) is a suite of open source software tools that can be used by water utilities to create response strategies to reduce the impact of contamination in a water distribution network . WST includes hydraulic and water quality modeling software , optimizati on methodologies , and visualization tools to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove, or destroy contaminants, (5) locations in the network to take grab sample s to help identify the source of contamination and (6) valves to close in order to isolate contaminate d areas of the network. This user manual describes the different components of WST , along w ith examples and case studies. License Notice The Water Security Toolkit (WST) v.1.2 Copyright c 2012 Sandia Corporation. Under the terms of Contract DE-AC04-94AL85000, there is a non-exclusive license for use of this work by or on behalf of the U.S. government. This software is distributed under the Revised BSD License (see below). In addition, WST leverages a variety of third-party software packages, which have separate licensing policies: Acro Revised BSD License argparse Python Software Foundation License Boost Boost Software License Coopr Revised BSD License Coverage BSD License Distribute Python Software Foundation License / Zope Public License EPANET Public Domain EPANET-ERD Revised BSD License EPANET-MSX GNU Lesser General Public License (LGPL) v.3 gcovr Revised BSD License GRASP AT&T Commercial License for noncommercial use; includes randomsample and sideconstraints executable files LZMA SDK Public Domain nose GNU Lesser General Public License (LGPL) v.2.1 ordereddict MIT License pip MIT License PLY BSD License PyEPANET Revised BSD License Pyro MIT License PyUtilib Revised BSD License PyYAML MIT License runpy2 Python Software Foundation License setuptools Python Software Foundation License / Zope Public License six MIT License TinyXML zlib License unittest2 BSD License Utilib Revised BSD License virtualenv MIT License Vol Common Public License vpykit Revised BSD License Additionally, some precompiled WST binary distributions might bundle other third-party executables files: Coliny Revised BSD License (part of Acro project) Dakota GNU Lesser General Public License (LGPL) v.2.1 PICO Revised BSD License (part of Acro project) i Revised BSD License Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of Sandia National Laboratories nor Sandia Corporation nor the names of its con- tributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS %22AS IS%22 AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IM- PLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SANDIA CORPORATION BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUD- ING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ii Acknowledgements This work was supported by the U.S. Environmental Protection Agen

  16. Waste Toolkit A-Z Cartridges Reclaim-IT

    E-Print Network [OSTI]

    Melham, Tom

    -pack in suitable protective packaging before placing in recycling box Mobile phones ­ include the battery and placeWaste Toolkit A-Z Cartridges ­ Reclaim-IT How can I recycle cartridges? You can recycle cartridges via Reclaim-IT, one of the largest companies in the UK dedicated to reusing and recycling empty laser

  17. University of Oxford Energy Toolkit2011/12

    E-Print Network [OSTI]

    Melham, Tom

    to reduce its energy consumption, due to: The rising cost of electricity, gas and oil Increasing legislative and cut your energy bills. The toolkit will help you to reduce electricity, gas and oil consumption dioxide we emit under the Government's Carbon Reduction Commitment (CRC) Energy Efficiency Scheme The need

  18. A Stochastic Processes Toolkit for Risk Management Damiano Brigo

    E-Print Network [OSTI]

    Brigo, Damiano

    in the quantitative analysis. The broad qualitative features addressed here are fat tails and mean reversion. We give technical analysis of the product or the entity under scrutiny. The quantitative analysis is not the finalA Stochastic Processes Toolkit for Risk Management Damiano Brigo , Antonio Dalessandro , Matthias

  19. Concrete Browsing Of A Graphical Toolkit Library Denys Duchier

    E-Print Network [OSTI]

    Duchier, Denys

    Concrete Browsing Of A Graphical Toolkit Library Denys Duchier Department of Computer Science and promote reuse. This paper introduces Concrete Browsing as an improved method of consult- ing a graphical library, and Spreading Computation as novel paradigm for search and retrieval. A concrete browser allows

  20. Concrete Browsing Of A Graphical Toolkit Library Denys Duchier

    E-Print Network [OSTI]

    Duchier, Denys

    Concrete Browsing Of A Graphical Toolkit Library Denys Duchier Department of Computer Science and promote reuse. This paper introduces Concrete Browsing as an improved method of consult­ ing a graphical library, and Spreading Computation as novel paradigm for search and retrieval. A concrete browser allows

  1. Lead User's theory adapted to services: Towards Service User's Toolkit

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Lead User's theory adapted to services: Towards Service User's Toolkit E. Stevens Prof under the perspective of networks and communities. Lead User's theory (LUT) focused mainly is to adapt lead user's theory and practice to the specific case of the intangible processes and services

  2. Ready...Set...MENTOR! A Speed Mentoring Toolkit

    E-Print Network [OSTI]

    California at Santa Barbara, University of

    Ready...Set...MENTOR! A Speed Mentoring Toolkit Introduction: Mentoring describes a developmental relationship between a mentor, who is a person with experience, skills and knowledge, and a protégé, who and work contexts. Informal mentoring may emerge between partners who spontaneously discover each other

  3. Capturing and Using Knowledge about the Use of Visualization Toolkits

    SciTech Connect (OSTI)

    Del Rio, Nicholas R.; Pinheiro da Silva, Paulo

    2012-11-02T23:59:59.000Z

    When constructing visualization pipelines using toolkits such as Visualization Toolkit (VTK) and Generic Mapping Tools (GMT), developers must understand (1) what toolkit operators will transform their data from its raw state to some required view state and (2) what viewers are available to present the generated view. Traditionally, developers learn about how to construct visualization pipelines by reading documentation and inspecting code examples, which can be costly in terms of the time and effort expended. Once an initial pipeline is constructed, developers may still have to undergo a trial and error process before a satisfactory visualization is generated. This paper presents the Visualization Knowledge Project (VisKo) that is built on a knowledge base of visualization toolkit operators and how they can be piped together to form visualization pipelines. Developers may now rely on VisKo to guide them when constructing visualization pipelines and in some cases, when VisKo has complete knowledge about some set of operators (i.e., sequencing and parameter settings), automatically generate a fully functional visualization pipeline.

  4. Code: A Lightweight and Flexible Mobile Code Toolkit

    E-Print Network [OSTI]

    Picco, Gian Pietro

    evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of client­server and mobile code in reducing the network traffic generated by management. The theoreticalŻCode: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

  5. ORCA: A Visualization Toolkit for High-Dimensional Data

    E-Print Network [OSTI]

    Washington at Seattle, University of

    are organized conceptually into segments of a pipeline. The software design of Orca takes advantage Lewin-Kohx, Dianne Cook, Zach Coxk Abstract This paper describes the background and design of the software, Orca. Orca is a exible and extensible toolkit for constructing interactive and dynamic linked

  6. Open Source Ch Control System Toolkit and Web-Based

    E-Print Network [OSTI]

    Cheng, Harry H.

    Open Source Ch Control System Toolkit and Web-Based Control System Design for Teaching Automatic, and WCCDM for teaching automatic control of linear time-invariant systems is presented. With the CCST.20454 Keywords: control systems; Web-based education INTRODUCTION Automatic control has become a major

  7. Using Strokes as Command Shortcuts: Cognitive Benefits and Toolkit Support

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Strokes as Command Shortcuts: Cognitive Benefits and Toolkit Support Caroline Appert1,2 2 LRI in com- parison to keyboard shortcuts when there is no mnemonic link between the shortcut and the command stroke shortcuts to Java Swing applications with just a few lines of code. ACM Classification Keywords H

  8. Biodiversity Toolkit Why we DON'T DIG PEAT

    E-Print Network [OSTI]

    Melham, Tom

    Biodiversity Toolkit Peat free Why we DON'T DIG PEAT The collegiate University is working to help the environment and wildlife by phasing out its use of products containing peat, such as compost and soil improver.admin.ox.ac.uk/estates/environment/biodiversity Cut your carbon emissions Wildlife living in peat bogs includes foxes, Irish hares, pygmy shrews, red

  9. Waste Toolkit A-Z Can I recycle stationery?

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Stationery Can I recycle stationery? Yes! You can recycle paper and paper based products such as used note pads, paper and cardboard files in the University Grundon recycling boxes. You can't recycle mixed materials that are made of non- recyclable plastic, such as plastic files

  10. Waste Toolkit A-Z Can I recycle paper cups?

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Paper cups Can I recycle paper cups? Yes. Paper cups can be recycled in the Grundon recycling boxes. Do not leave dregs of drink in them, as this will contaminate the recycling box. Although it is good to recycle paper cups, it is more sustainable to use china cups that can be washed

  11. Waste Toolkit A-Z How can I recycle computers?

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Computers How can I recycle computers? The University policy for computer disposal is outlined in detail, here: www.ict.ox.ac.uk/oxford/disposal/index.xml Recycle/reuse 1. Before If the computer can't be reused, it should be recycled by an authorised contractor who will guarantee that all

  12. Insects Attacking Vegetable Crops.

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01T23:59:59.000Z

    of economic importance. Worms cause consider- able damage to grain sorghum heads, but they are cannibalistic and usually only one larva reaches full growth in each head as well as in each corn ear. BLACK CUTWORM, Agrotis ipsilon (Hufnagel) Cutworms.... They frequently do considerable damage to corn ears, similar to that caused by corn ear- worms. These worms also feed as "budworms" in grain sorghum and corn whorls. Unfolding leaves from whorls of such attacked crops are per- forated with holes. Like...

  13. Insects Attacking Vegetable Crops. 

    E-Print Network [OSTI]

    Newton, Weldon H.; Deer, James A.; Hamman, Philip J.; Wolfenbarger, Dan A.; Harding, James A.; Schuster, Michael F.

    1964-01-01T23:59:59.000Z

    THAT SUCK THE JUICES FROM FOLIAGE, FRUITS, STEMS AND ROOTS, CAUSING DISCOLORATION, STUNTING AND OTHER DAMAGE APHIDS Aphids are small, sluggish, soft-bodied insects often called plant lice. A number of species attack various crops, sucking plant sap..., peppers or dark brown with black leg joints, eyes and and tomatoes. cornicles. Aphids build up very rapidly and leave copious quantities of honeydew on leaves. Adults POPLAR PETIOLE GALL APHID, Pemphigus and nymphs suck juices from leaves, sapping...

  14. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01T23:59:59.000Z

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  15. After-gate attack on a quantum cryptosystem

    E-Print Network [OSTI]

    Carlos Wiechers; Lars Lydersen; Christoffer Wittmann; Dominique Elser; Johannes Skaar; Christoph Marquardt; Vadim Makarov; Gerd Leuchs

    2010-09-14T23:59:59.000Z

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  16. Monitoring the grid with the globus toolkit MDS4.

    SciTech Connect (OSTI)

    Schopf, J. M.; Pearlman, L.; Miller, N.; Kesselman, C.; Foster, I.; D'Arcy, M.; Chervenak, A.; Mathematics and Computer Science; Univ. of Chicago; Univ. of Southern California; Univ. of Edinburgh

    2006-01-01T23:59:59.000Z

    The Globus Toolkit Monitoring and Discovery System (MDS4) defines and implements mechanisms for service and resource discovery and monitoring in distributed environments. MDS4 is distinguished from previous similar systems by its extensive use of interfaces and behaviors defined in the WS-Resource Framework and WS-Notification specifications, and by its deep integration into essentially every component of the Globus Toolkit. We describe the MDS4 architecture and the Web service interfaces and behaviors that allow users to discover resources and services, monitor resource and service states, receive updates on current status, and visualize monitoring results. We present two current deployments to provide insights into the functionality that can be achieved via the use of these mechanisms.

  17. Guide to Using the WIND Toolkit Validation Code

    SciTech Connect (OSTI)

    Lieberman-Cribbin, W.; Draxl, C.; Clifton, A.

    2014-12-01T23:59:59.000Z

    In response to the U.S. Department of Energy's goal of using 20% wind energy by 2030, the Wind Integration National Dataset (WIND) Toolkit was created to provide information on wind speed, wind direction, temperature, surface air pressure, and air density on more than 126,000 locations across the United States from 2007 to 2013. The numerical weather prediction model output, gridded at 2-km and at a 5-minute resolution, was further converted to detail the wind power production time series of existing and potential wind facility sites. For users of the dataset it is important that the information presented in the WIND Toolkit is accurate and that errors are known, as then corrective steps can be taken. Therefore, we provide validation code written in R that will be made public to provide users with tools to validate data of their own locations. Validation is based on statistical analyses of wind speed, using error metrics such as bias, root-mean-square error, centered root-mean-square error, mean absolute error, and percent error. Plots of diurnal cycles, annual cycles, wind roses, histograms of wind speed, and quantile-quantile plots are created to visualize how well observational data compares to model data. Ideally, validation will confirm beneficial locations to utilize wind energy and encourage regional wind integration studies using the WIND Toolkit.

  18. Satellite Threat Warning and Attack Reporting

    SciTech Connect (OSTI)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31T23:59:59.000Z

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  19. Sulfate attack expansion mechanisms

    SciTech Connect (OSTI)

    Müllauer, Wolfram, E-mail: wolf_m@gmx.at; Beddoe, Robin E.; Heinz, Detlef

    2013-10-15T23:59:59.000Z

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  20. Time-shift attack in practical quantum cryptosystems

    E-Print Network [OSTI]

    Bing Qi; Chi-Hang Fred Fung; Hoi-Kwong Lo; Xiongfeng Ma

    2006-05-11T23:59:59.000Z

    Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in principle, could acquire full information on the final key without introducing any error. Finally, we discuss some counter measures against our and earlier attacks.

  1. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect (OSTI)

    Kumar, K. E. Naresh [PG Student, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Waheed, Mohd. Abdul [Asst. Professor, Dept of Computer Science and Engineering, KBNCE, Gulbarga, Karnataka (India); Basappa, K. Kari [Professor, Dept of E and CE, Dayanand College of Engineering, Banglore, Karnataka (India)

    2010-10-26T23:59:59.000Z

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  2. Automatic Scheme Selection for Toolkit Hex Meshing

    SciTech Connect (OSTI)

    TAUTGES,TIMOTHY J.; WHITE,DAVID R.

    1999-09-27T23:59:59.000Z

    Current hexahedral mesh generation techniques rely on a set of meshing tools, which when combined with geometry decomposition leads to an adequate mesh generation process. Of these tools, sweeping tends to be the workhorse algorithm, accounting for at least 50% of most meshing applications. Constraints which must be met for a volume to be sweepable are derived, and it is proven that these constraints are necessary but not sufficient conditions for sweepability. This paper also describes a new algorithm for detecting extruded or sweepable geometries. This algorithm, based on these constraints, uses topological and local geometric information, and is more robust than feature recognition-based algorithms. A method for computing sweep dependencies in volume assemblies is also given. The auto sweep detect and sweep grouping algorithms have been used to reduce interactive user time required to generate all-hexahedral meshes by filtering out non-sweepable volumes needing further decomposition and by allowing concurrent meshing of independent sweep groups. Parts of the auto sweep detect algorithm have also been used to identify independent sweep paths, for use in volume-based interval assignment.

  3. Automatic scheme selection for toolkit hex meshing

    SciTech Connect (OSTI)

    WHITE,DAVID R.; TAUTGES,TIMOTHY J.

    2000-02-17T23:59:59.000Z

    Current hexahedral mesh generation techniques rely on a set of meshing tools, which when combined with geometry decomposition leads to an adequate mesh generation process. Of these tools, sweeping tends to be the workhorse algorithm, accounting for at least 50% of most meshing applications. Constraints which must be met for a volume to be sweepable are derived, and it is proven that these constraints are necessary but not sufficient conditions for sweepability. This paper also describes a new algorithm for detecting extruded or sweepable geometries. This algorithm, based on these constraints, uses topological and local geometric information, and is more robust than feature recognition-based algorithms. A method for computing sweep dependencies in volume assemblies is also given. The auto sweep detect and sweep grouping algorithms have been used to reduce interactive user time required to generate all-hexahedral meshes by filtering out non-sweepable volumes needing further decomposition and by allowing concurrent meshing of independent sweep groups. Parts of the auto sweep detect algorithm have also been used to identify independent sweep paths, for use in volume-based interval assignment.

  4. Computational Science Technical Note CSTN-052 Simulation Modelling and Visualisation: Toolkits for Building Artificial Worlds

    E-Print Network [OSTI]

    Hawick, Ken

    }, title = {Simulation Modelling and Visualisation: Toolkits for Building Artificial Worlds}, journal0 Computational Science Technical Note CSTN-052 Simulation Modelling and Visualisation: Toolkits for Building Artificial Worlds Daniel Peter Playne and Anton P Gerdelan and Arno Leist and Chris J Scogings

  5. The svgl toolkit: enabling fast rendering of rich 2D graphics Stephane Conversy1,2

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The svgl toolkit: enabling fast rendering of rich 2D graphics St´ephane Conversy1,2 Jean powerful graphical processors be- come available on mainstream computers, it becomes possible , a graphical toolkit that enables programmers and design- ers of interactive applications to benefit from

  6. U. S. Army Measurement and Verification (M&V) Costing Toolkit

    E-Print Network [OSTI]

    Haberl, J. S.; Powell, T.; Carlson, K. A.; Im, P.; Turner, W. D.

    2003-01-01T23:59:59.000Z

    for monitoring and verifying savings, and a description of the M&V Costing Toolkit. In addition, examples of the use of the M&V Costing Toolkit will also be presented for thirteen scenarios, including the M&V of boilers, chillers, EMCS, and lighting retrofits....

  7. 14 Market-Oriented Cloud Computing and the Cloudbus Toolkit Rajkumar Buyya1,2

    E-Print Network [OSTI]

    Buyya, Rajkumar

    1 14 Market-Oriented Cloud Computing and the Cloudbus Toolkit Rajkumar Buyya1,2 , Suraj Pandey1 , and Christian Vecchiola1 1 Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computing OF CONTENTS 14 Market-Oriented Cloud Computing and the Cloudbus Toolkit

  8. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12T23:59:59.000Z

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  9. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01T23:59:59.000Z

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  10. Modeling modern network attacks and countermeasures using attack graphs

    E-Print Network [OSTI]

    Ingols, Kyle W.

    By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective countermeasures. This paper describes substantial enhancements ...

  11. The advanced computational testing and simulation toolkit (ACTS)

    SciTech Connect (OSTI)

    Drummond, L.A.; Marques, O.

    2002-05-21T23:59:59.000Z

    During the past decades there has been a continuous growth in the number of physical and societal problems that have been successfully studied and solved by means of computational modeling and simulation. Distinctively, a number of these are important scientific problems ranging in scale from the atomic to the cosmic. For example, ionization is a phenomenon as ubiquitous in modern society as the glow of fluorescent lights and the etching on silicon computer chips; but it was not until 1999 that researchers finally achieved a complete numerical solution to the simplest example of ionization, the collision of a hydrogen atom with an electron. On the opposite scale, cosmologists have long wondered whether the expansion of the Universe, which began with the Big Bang, would ever reverse itself, ending the Universe in a Big Crunch. In 2000, analysis of new measurements of the cosmic microwave background radiation showed that the geometry of the Universe is flat, and thus the Universe will continue expanding forever. Both of these discoveries depended on high performance computer simulations that utilized computational tools included in the Advanced Computational Testing and Simulation (ACTS) Toolkit. The ACTS Toolkit is an umbrella project that brought together a number of general purpose computational tool development projects funded and supported by the U.S. Department of Energy (DOE). These tools, which have been developed independently, mainly at DOE laboratories, make it easier for scientific code developers to write high performance applications for parallel computers. They tackle a number of computational issues that are common to a large number of scientific applications, mainly implementation of numerical algorithms, and support for code development, execution and optimization. The ACTS Toolkit Project enables the use of these tools by a much wider community of computational scientists, and promotes code portability, reusability, reduction of duplicate efforts, and tool maturity. This paper presents a brief introduction to the functionality available in ACTS.

  12. Genetic attack on neural cryptography

    SciTech Connect (OSTI)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido [Institut fuer Theoretische Physik, Universitaet Wuerzburg, Am Hubland, 97074 Wuerzburg (Germany); Minerva Center and Department of Physics, Bar Ilan University, Ramat Gan 52900 (Israel)

    2006-03-15T23:59:59.000Z

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  13. Smart Grid Data Integrity Attack

    E-Print Network [OSTI]

    Poolla, Kameshwar

    2012-01-01T23:59:59.000Z

    IEEE Transactions on Smart Grid, vol. 2, no. 2, June [21] O.Malicious Data Attacks on Smart Grid State Estimation:Framework and Roadmap for Smart Grid Interoperability Stan-

  14. Cinfony - combining Open Source cheminformatics toolkits behind a common interface

    E-Print Network [OSTI]

    O'Boyle, Noel M; Hutchison, Geoffrey R

    2008-12-03T23:59:59.000Z

    on molecules Atom Wraps an atom instance of the underlying toolkit MoleculeData Provides dictionary-like access to the information contained in the tag fields in SDF and MOL2 files Outputfile Handles multimolecule output file formats Smarts Wraps the SMARTS... .calcfp() output = cdk.Outputfile("sdf", "similar mols.sdf") for mol in cdk.readfile("sdf", "input file.sdf"): fp = mol.calcfp() if fp | targetfp >= 0.7: output.write(mol) output.close() Alternatively, we could just have made a single change to the original script...

  15. The Wind Integration National Dataset (WIND) toolkit (Presentation)

    SciTech Connect (OSTI)

    Caroline Draxl: NREL

    2014-01-01T23:59:59.000Z

    Regional wind integration studies require detailed wind power output data at many locations to perform simulations of how the power system will operate under high penetration scenarios. The wind datasets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as being time synchronized with available load profiles.As described in this presentation, the WIND Toolkit fulfills these requirements by providing a state-of-the-art national (US) wind resource, power production and forecast dataset.

  16. File:RAPID Toolkit Flyer.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 NoEuropeStrat.pdf Jump to:student-HS.pdf Jump to:RAPID Toolkit

  17. Geospatial Toolkit (GsT) Webinar | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluating A PotentialJumpGermanFifeGEXAGarnet VRXRate-MakingConferenceToolkit (GsT)

  18. LEDSGP/Transportation Toolkit/Tools | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, searchLEDSGP/Transportation Toolkit/Tools < LEDSGP‎ |

  19. LEDSGP/Transportation Toolkit/Training | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, searchLEDSGP/Transportation Toolkit/Tools < LEDSGP‎

  20. LEDSGP/Transportation Toolkit/Training | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant Jump to: navigation, searchLEDSGP/Transportation Toolkit/Tools < LEDSGP‎

  1. Project Screening and Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt Institute forToolkit Jump to: navigation, search Stage 2

  2. Project Screening and Design Toolkit | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:Precourt Institute forToolkit Jump to: navigation, search Stage

  3. USAID Toolkit for Increasing Energy Access | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga, IndianaTurtle Airships JumpTypefor AfricaToolkit for Increasing

  4. Source Location Privacy against Laptop-Class Attacks in Sensor Networks

    E-Print Network [OSTI]

    Liu, Donggang

    it is then possible for them to interfere with the phenomena being sensed or even mount physical attacks on the mon- sages sent periodically to hide real event reports. The global and greedy solutions improve the naive towards a base station to report this event. Note that an attacker can easily detect the transmission

  5. Networked Control Systems under Cyber Attacks with Applications to Power Networks

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Terms-- Networked Control Systems, Fault Detection, Power Systems I. INTRODUCTION Several infrastructure infrastructure systems are vulnerable to cyber attacks [1], [2], which are performed on the information residingNetworked Control Systems under Cyber Attacks with Applications to Power Networks Andr´e Teixeira

  6. CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

    E-Print Network [OSTI]

    Bencsáth, Boldizsár

    CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot D´aniel Istv of control system elements, such as PLCs. In this paper, we design and implement the Crysys PLC honeypot (CryPLH) system to detect targeted attacks against industrial control systems. This PLC honeypot can

  7. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  8. Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster)

    SciTech Connect (OSTI)

    Young, K. R.; Levine, A.

    2014-09-01T23:59:59.000Z

    The Regulatory and Permitting Information Desktop (RAPID) Toolkit combines the former Geothermal Regulatory Roadmap, National Environmental Policy Act (NEPA) Database, and other resources into a Web-based tool that gives the regulatory and utility-scale geothermal developer communities rapid and easy access to permitting information. RAPID currently comprises five tools - Permitting Atlas, Regulatory Roadmap, Resource Library, NEPA Database, and Best Practices. A beta release of an additional tool, the Permitting Wizard, is scheduled for late 2014. Because of the huge amount of information involved, RAPID was developed in a wiki platform to allow industry and regulatory agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users. In 2014, the content was expanded to include regulatory requirements for utility-scale solar and bulk transmission development projects. Going forward, development of the RAPID Toolkit will focus on expanding the capabilities of current tools, developing additional tools, including additional technologies, and continuing to increase stakeholder involvement.

  9. Abstract --Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely

    E-Print Network [OSTI]

    Lee, Ruby B.

    Abstract -- Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely on manual detection of DDoS attacks after which offline fine- grain traffic-evolving characteristics of the attacking packets. Recently, we have proposed a DDoS defense architecture that supports

  10. Appalachian Colleges Community Economic Development Partnership The Small Private Colleges Economic Development Toolkit

    E-Print Network [OSTI]

    Engel, Jonathan

    Partnerships o Evaluation: Measuring Effectiveness #12;The Small Private Colleges Economic Development ToolkitAppalachian Colleges Community Economic Development Partnership The Small Private Colleges Economic and sustainable economic development outreach programs. It contains carefully selected articles and case studies

  11. A Java Reinforcement Learning Module for the Recursive Porous Agent Simulation Toolkit

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Reinforcement Learning Module for the Recursive Porous Agent Simulation Toolkit: facilitating study and experimentation with reinforcement learning in social science multi-agent simulations-implemented reinforcement learning algorithms . . . . . 34 4.1 The Roth-Erev algorithm . . . . . . . . . . . . . . . . .

  12. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis

    E-Print Network [OSTI]

    Gong, Shuping; Li, Husheng; Dimitrovski, Aleksandar D

    2012-01-01T23:59:59.000Z

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel time stamp attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing.

  13. Time Synchronization Attack in Smart Grid-Part I: Impact and Analysis

    E-Print Network [OSTI]

    Zhang, Zhenghao; Dimitrovski, Aleksandar D; Li, Husheng

    2012-01-01T23:59:59.000Z

    Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS) for precise timing, it is highly probable to attack the measurement system by spoofing the GPS. The effectiveness of TSA is demonstrated for three applications of phasor measurement unit (PMU) in smart grid, namely transmission line fault detection, voltage stability monitoring and event locationing. The validity of TSA is demonstrated by numerical simulations.

  14. Migration of 1970s Minicomputer Controls to Modern Toolkit Software

    SciTech Connect (OSTI)

    Juras, R.C.; Meigs, M.J.; Sinclair, J.A.; Tatum, B.A.

    1999-11-13T23:59:59.000Z

    Controls for accelerators and associated systems at the Holifield Radioactive Ion Beam Facility (HRIBF) at Oak Ridge National Laboratory have been migrated from 197Os-vintage minicomputers to a modern system based on Vista and EPICS toolkit software. Stability and capabilities of EPICS software have motivated increasing use of EPICS for accelerator controls. In addition, very inexpensive subsystems based on EPICS and the EPICS portable CA server running on Linux PCs have been implemented to control an ion source test facility and to control a building-access badge reader system. A new object-oriented, extensible display manager has been developed for EPICS to facilitate the transition to EPICS and will be used in place of MEDM. EPICS device support has been developed for CAMAC serial highway controls.

  15. PHISICS TOOLKIT: MULTI-REACTOR TRANSMUTATION ANALYSIS UTILITY - MRTAU

    SciTech Connect (OSTI)

    Andrea Alfonsi; Cristian Rabiti; Aaron S. Epiney; Yaqi Wang; Joshua Cogliati

    2012-04-01T23:59:59.000Z

    The principal idea of this paper is to present the new capabilities available in the PHISICS toolkit, connected with the implementation of the depletion code MRTAU, a generic depletion/ decay/burn-up code developed at the Idaho National Laboratory. It is programmed in a modular structure and modern FORTRAN 95/2003. The code tracks the time evolution of the isotopic concentration of a given material accounting for nuclear reaction happening in presence of neutron flux and also due to natural decay. MRTAU has two different methods to perform the depletion calculation, in order to let the user choose the best one respect his needs. Both the methodologies and some significant results are reported in this paper.

  16. Supporting integrated design through interlinked tools: The Labs21 toolkit

    SciTech Connect (OSTI)

    Mathew, Paul; Bell, Geoffrey; Carlisle, Nancy; Sartor, Dale; van Geet, Otto; Lintner, William; Wirdzek, Phil

    2003-09-15T23:59:59.000Z

    The sustainable design of complex building types such as laboratories and hospitals can be particularly challenging, given their inherent complexity of systems, health and safety requirements, long-term flexibility and adaptability needs, energy use intensity, and environmental impacts. Tools such as design guides, energy benchmarking, and LEED rating systems are especially helpful to support sustainable design in such buildings. Furthermore, designers need guidance on how to effectively and appropriately use each tool within the context of an integrated design process involving multiple actors with various objectives. Toward this end, the Laboratories for the 21st Century (Labs21) program has developed an interlinked set of tools -- the Labs21 Toolkit -- to support an integrated design process for sustainable laboratories. Labs21 is a voluntary partnership program sponsored by the U.S. Environmental Protection Agency (EPA) and U.S. Department of Energy (DOE) to improve the environment al performance of U.S. laboratories. In this paper, we present the Labs21 Toolkit, and illustrate how these tools can be used to support sustainable design within an integrated design process. The tool kit includes core information tools, as well as process-related tools, as indicated below: Core information tools: -A Design Guide, which is a compendium of publications on energy efficiency in laboratories -Case Studies that showcase high-performance design features and applications. -Best Practice Guides that highlight industry-leading sustainable design strategies. -A web-based Benchmarking Tool to benchmark laboratory energy performance.Process tools: -A Design Intent Tool, which can be used to used to plan, document, and verify that a facility's design intent is being met at each stage of the design process. The Environmental Performance Criteria (EPC), a rating system specifically designed for laboratory facilities that builds on the LEED(TM) system. -A web-based Process Manual, that provides a ''portal'' to the tools and a step-by-step process for using these tools during each stage of the design process.

  17. HAN Attack Surface and the Open Smart Energy Gateway Project

    E-Print Network [OSTI]

    Searle, Justin

    2014-01-01T23:59:59.000Z

    HAN  Attack  Surface  and  the  Open  Smart   Energy  of  California.   HAN  Attack  Surface  and  the  Open  vulnerable  to  cyber   attacks  (i.e.  “hacking”)  and  

  18. The Attack on Planned Parenthood: A Historical Analysis

    E-Print Network [OSTI]

    Primrose, Sarah

    2012-01-01T23:59:59.000Z

    Party Republicans' Latest Attack on Women's Health and Birthtea-party-republicans-latest-attack-womens-health- birth-ARTICLES THE ATTACK ON PLANNED PARENTHOOD: A HISTORICAL

  19. attack synthetic polymers: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  20. attacks draft resolution: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  1. armed attacks draft: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  2. amyloid oxidative attack: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XiaoFeng Wang to as stealth attacks 11 with a focus on vehicular technologies. Stealth attacks are attacks that can Avenue, Bloomington, IN 47405, USA Stevens Institute...

  3. The Sybil Attack John R. Douceur

    E-Print Network [OSTI]

    Keinan, Alon

    1 The Sybil Attack John R. Douceur Microsoft Research johndo@microsoft.com "One can have, some undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks

  4. The GHS Attack Revisited Computer Science Department,

    E-Print Network [OSTI]

    Hess, Florian

    The GHS Attack Revisited F. Hess Computer Science Department, Woodland Road, University of Bristol the number of elliptic curves which succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude

  5. Vulnerability Discovery with Attack IEEE Transactions on Software Engineering (2010)

    E-Print Network [OSTI]

    Bae, Doo-Hwan

    2010-01-01T23:59:59.000Z

    : Monitor target system's state while executing attacks in 3 ways Overview of tool AJECT #12;Attack generate attacks in 4 ways Injection phase: Execute previously generated test cases(attacks) Monitoring

  6. Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

    E-Print Network [OSTI]

    Nitin Jain; Birgit Stiller; Imran Khan; Vadim Makarov; Christoph Marquardt; Gerd Leuchs

    2014-12-19T23:59:59.000Z

    An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.

  7. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01T23:59:59.000Z

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  8. Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    Abstract-A mimicry attack is a type of attack where the basic steps of a minimalist `core' attack are used to design multiple attacks achieving the same objective from the same application. Research in mimicry attacks is valuable in determining and eliminating weaknesses of detectors. In this work, we

  9. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect (OSTI)

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01T23:59:59.000Z

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  10. Distributed Open Inventor is an extension to the popular Open Inventor toolkit for interactive 3D graphics. The

    E-Print Network [OSTI]

    ABSTRACT Distributed Open Inventor is an extension to the popular Open Inventor toolkit for interactive 3D graphics. The toolkit is extended with the concept of a distributed shared scene graph, similar to distributed shared memory. From the application programmer's perspective, multiple workstations share a common

  11. Dissipation attack on Bennett-Brassard 1984 protocol in practical quantum key distribution system

    E-Print Network [OSTI]

    Li Yang; Bing Zhu

    2013-05-24T23:59:59.000Z

    We propose a new kind of individual attack, based on randomly selected dissipation, on Bennett-Brassard 1984 protocol of practical quantum key distribution (QKD) system with lossy and noisy quantum channel. Since an adversary with super quantum channel can disguise loss and errors induced by his attack as that of the system, he can obtain innegligible amount of information for a practical QKD system, without being detected by legal participants.

  12. TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding

    E-Print Network [OSTI]

    Markopoulou, Athina

    TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

  13. An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    scanners and intrusion detection systems. FORTH-ICS, Greece, {mikepo,markatos}@ics.forth.gr I2R, Singapore-- detected over the course of more than 20 months. The attacks were captured by monitoring the traffic as many systems as possible and keep them under control for as long as possible. Code obfuscation

  14. The Zombie Attack on the Computational Conception of Mind

    E-Print Network [OSTI]

    Bringsjord, Selmer

    The Zombie Attack on the Computational Conception of Mind Selmer Bringsjord Department defense of the zombie attack against computationalism. Dennett, more than any other thinker, says, rigorous attack on computationalism -- the zombie attack. If this attack is sound, it will follow not only

  15. A Platform-Based Software Design Methodology for Embedded Control Systems: An Agile Toolkit

    E-Print Network [OSTI]

    Southampton, University of

    A Platform-Based Software Design Methodology for Embedded Control Systems: An Agile Toolkit Lucas con- straints, is effectively an embedded real-time system and hence requires a rigorous methodology to develop the soft- ware involved. The development methodology proposed in this paper adapts agile

  16. ProtEx: a toolkit for the analysis of distributed real-time systems

    E-Print Network [OSTI]

    Meylan, Yves Damien Meylan

    2000-01-01T23:59:59.000Z

    and queuing policies present in a system. In this thesis we present a methodology to extend the traditional RMA approach by allowing general characterization of workload and flexible modeling of resources. We realize our approaches within ProtEx, a toolkit...

  17. Toolkit for Teaching Steering Behaviors for 3D Human-like Virtual Agents (Demonstration)

    E-Print Network [OSTI]

    Brom, Cyril

    of steering behaviors for Pogamut toolkit for developing control mechanisms of virtual agents. The second one]: Model Development General Terms Algorithms Keywords Steering behaviors, Human-like virtual agents behavior shows that steering behaviors may not only control low-level navigation, but they may also be used

  18. Virtual venue management users manual : access grid toolkit documentation, version 2.3.

    SciTech Connect (OSTI)

    Judson, I. R.; Lefvert, S.; Olson, E.; Uram, T. D.; Mathematics and Computer Science

    2007-10-24T23:59:59.000Z

    An Access Grid Venue Server provides access to individual Virtual Venues, virtual spaces where users can collaborate using the Access Grid Venue Client software. This manual describes the Venue Server component of the Access Grid Toolkit, version 2.3. Covered here are the basic operations of starting a venue server, modifying its configuration, and modifying the configuration of the individual venues.

  19. The Portable Extensible Toolkit for Scientific computing Day 1: Usage and Algorithms

    E-Print Network [OSTI]

    The Portable Extensible Toolkit for Scientific computing Day 1: Usage and Algorithms Jed Brown CSCS runs performantly on a laptop · No iPhone support Jed Brown (ETH Zürich) PETSc day 1 CSCS 2010-05-10 5) · Same code runs performantly on a laptop · No iPhone support Jed Brown (ETH Zürich) PETSc day 1 CSCS

  20. Building Replicated Internet Services Using TACT: A Toolkit for Tunable Availability and Consistency Tradeoffs

    E-Print Network [OSTI]

    Vahdat, Amin

    Building Replicated Internet Services Using TACT: A Toolkit for Tunable Availability of scalable, high-performance, highly-available and fault-tolerant systems. Replication is an important ap in lower system availability in the presence of network partitions. Thus, there is a fundamen- tal tradeoff

  1. Waste Toolkit A-Z How can I reduce waste envelopes?

    E-Print Network [OSTI]

    Melham, Tom

    Waste Toolkit A-Z Envelopes How can I reduce waste envelopes? Departments and colleges can reduce waste envelopes by using internal envelopes; reusing envelopes and where appropriate, switching from paper communication to electronic communication. Internal envelopes Internal `ladder' envelopes can save

  2. A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias Schunter

    E-Print Network [OSTI]

    Backes, Michael

    A Toolkit for Managing Enterprise Privacy Policies Michael Backes, Birgit Pfitzmann, and Matthias proposed by IBM. The basic definition is refinement, i.e., the question whether fulfilling one policy been #12;102 Michael Backes, Birgit Pfitzmann, and Matthias Schunter collected has to govern the use

  3. Waste Toolkit A-Z Food waste (recycling on-site)

    E-Print Network [OSTI]

    Melham, Tom

    into compost in 14 days, when mixed with wood chippings (from your grounds/gardens). The waste is heated usingWaste Toolkit A-Z Food waste (recycling on-site) How can I recycle food waste on-site? Recycling food waste on-site is a new concept as the University typically has its waste collected and taken away

  4. The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise

    E-Print Network [OSTI]

    Sommerville, Ian

    1 The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise Ali Khajeh-Hosseini, David Greenwood, James W. Smith, Ian Sommerville Cloud Computing Co-laboratory, School of Computer Science University of St Andrews, UK {akh, dsg22, jws7, ifs}@cs.st-andrews.ac.uk Abstract Cloud computing

  5. Using the GridSim Toolkit for Enabling Grid Computing Education Manzur Murshed

    E-Print Network [OSTI]

    Melbourne, University of

    with (Grid-enabled) resources or their agents using middleware services, map tasks to resources (schedulingUsing the GridSim Toolkit for Enabling Grid Computing Education Manzur Murshed Gippsland School: Grid Simulation; Education; Scheduling; Resource Management. Abstract Numerous research groups

  6. Development of a Measurement and Verification (M&V) Costing Toolkit

    E-Print Network [OSTI]

    Haberl, J. S.; Lewis, T.; Im, P.; Carlson, K. A.; Underwood, D.

    2004-01-01T23:59:59.000Z

    This paper discusses the development of a M&V Costing Toolkit that has been developed to assist the U.S. Army with the standardization of costing procedures for measuring and verifying energy savings from Energy Service Performance Contracts (ESPC...

  7. Development of an Online Toolkit for Measuring Commercial Building Energy Efficiency Performance -- Scoping Study

    SciTech Connect (OSTI)

    Wang, Na

    2013-03-13T23:59:59.000Z

    This study analyzes the market needs for building performance evaluation tools. It identifies the existing gaps and provides a roadmap for the U.S. Department of Energy (DOE) to develop a toolkit with which to optimize energy performance of a commercial building over its life cycle.

  8. Managing Attack Graph Complexity Through Visual Hierarchical Aggregation

    E-Print Network [OSTI]

    Noel, Steven

    Managing Attack Graph Complexity Through Visual Hierarchical Aggregation Steven Noel Center a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation collapses non-overlapping subgraphs of the attack graph

  9. The GHS Attack in odd Characteristic Claus Diem

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points

  10. GARNET : a Graphical Attack graph and Reachability Network Evaluation Tool

    E-Print Network [OSTI]

    Williams, Leevar (Leevar Christoff)

    2008-01-01T23:59:59.000Z

    Attack graphs are valuable tools in the assessment of network security, revealing potential attack paths an adversary could use to gain control of network assets. Creating an effective visualization for attack graphs is ...

  11. Jaguar Attack on a Child: Case Report and Literature Review

    E-Print Network [OSTI]

    Iserson, Kenneth V.; Francis, Adama M.

    2015-01-01T23:59:59.000Z

    Harlan G. Fatal Big Cat Attacks. Am J Forensic Med Pathol.Iserson et al. Jaguar Attack on a Child 18. Rabinowitz AR,SM, Mills A, Shoff WH. Human attacks by large 25. Bahram R,

  12. Evaluation of Profile Injection Attacks In Collaborative Recommender Systems

    E-Print Network [OSTI]

    Schaefer, Marcus

    Evaluation of Profile Injection Attacks In Collaborative Recommender Systems Chad Williams, Runa recommender systems. The open nature of collaborative filtering allows attackers to inject biased profile data identified attack profiles. Second, we analyze the effectiveness of a supervised classification approach

  13. Modeling Attacks on Physical Unclonable Functions Ulrich Rhrmair

    E-Print Network [OSTI]

    against these problems, but they all rest on the concept of a secret binary key. Classical cryp- tography, semi-invasive, or side-channel attacks, as well as software attacks like API- attacks and viruses, can

  14. A Scalable Framework for Cyber Attack Discovery and Situational...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

  15. TagMe: an easy-to-use toolkit for turning the personal environment into an extended communications interface

    E-Print Network [OSTI]

    Benavides Palos, Xavier

    In this paper we present an end-user toolkit for easy creation of responsive objects and environments. TagMe consists of a wearable device that recognizes the object or surface the user is touching. The user can make ...

  16. Phase 1 Development Report for the SESSA Toolkit.

    SciTech Connect (OSTI)

    Knowlton, Robert G.; Melton, Brad J; Anderson, Robert J.

    2014-09-01T23:59:59.000Z

    The Site Exploitation System for Situational Awareness ( SESSA ) tool kit , developed by Sandia National Laboratories (SNL) , is a comprehensive de cision support system for crime scene data acquisition and Sensitive Site Exploitation (SSE). SESSA is an outgrowth of another SNL developed decision support system , the Building R estoration Operations Optimization Model (BROOM), a hardware/software solution for data acquisition, data management, and data analysis. SESSA was designed to meet forensic crime scene needs as defined by the DoD's Military Criminal Investigation Organiza tion (MCIO) . SESSA is a very comprehensive toolki t with a considerable amount of database information managed through a Microsoft SQL (Structured Query Language) database engine, a Geographical Information System (GIS) engine that provides comprehensive m apping capabilities, as well as a an intuitive Graphical User Interface (GUI) . An electronic sketch pad module is included. The system also has the ability to efficiently generate necessary forms for forensic crime scene investigations (e.g., evidence submittal, laboratory requests, and scene notes). SESSA allows the user to capture photos on site, and can read and generate ba rcode labels that limit transcription errors. SESSA runs on PC computers running Windows 7, but is optimized for touch - screen tablet computers running Windows for ease of use at crime scenes and on SSE deployments. A prototype system for 3 - dimensional (3 D) mapping and measur e ments was also developed to complement the SESSA software. The mapping system employs a visual/ depth sensor that captures data to create 3D visualizations of an interior space and to make distance measurements with centimeter - level a ccuracy. Output of this 3D Model Builder module provides a virtual 3D %22walk - through%22 of a crime scene. The 3D mapping system is much less expensive and easier to use than competitive systems. This document covers the basic installation and operation of th e SESSA tool kit in order to give the user enough information to start using the tool kit . SESSA is currently a prototype system and this documentation covers the initial release of the tool kit . Funding for SESSA was provided by the Department of Defense (D oD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL) . ACKNOWLEDGEMENTS The authors wish to acknowledge the funding support for the development of the Site Exploitation System for Situational Awareness (SESSA) toolkit from the Department of Defense (DoD), Assistant Secretary of Defense for Research and Engineering (ASD(R&E)) Rapid Fielding (RF) organization. The project was managed by the Defense Forensic Science Center (DFSC) , formerly known as the U.S. Army Criminal Investigation Laboratory (USACIL). Special thanks to Mr. Garold Warner, of DFSC, who served as the Project Manager. Individuals that worked on the design, functional attributes, algorithm development, system arc hitecture, and software programming include: Robert Knowlton, Brad Melton, Robert Anderson, and Wendy Amai.

  17. Detecting a Biological Attack The attack will not be obvious; it

    E-Print Network [OSTI]

    Gilfoyle, Jerry

    and Development Agreement (CRADA) between Oak Ridge National Laboratory and several companies. The Microelektronik

  18. On traffic analysis attacks and countermeasures

    E-Print Network [OSTI]

    Fu, Xinwen

    2007-04-25T23:59:59.000Z

    . This is true even if some commonly used countermeasures (e.g., link padding) have been deployed. We proposed an alternative effective countermeasure to counter this passive traffic analysis attack. Our extensive experimental results indicated...

  19. Real-time analysis of aggregate network traffic for anomaly detection

    E-Print Network [OSTI]

    Kim, Seong Soo

    2005-08-29T23:59:59.000Z

    The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. If efficient analysis tools were available, it could become possible to detect the attacks, anomalies...

  20. Practical Electromagnetic Template Attack on Pierre-Alain Fouque1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Practical Electromagnetic Template Attack on HMAC Pierre-Alain Fouque1 , Gaëtan Leurent1 , Denis efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals and can configure it, the attack recovers the secret key by monitoring a single execution of HMAC- SHA-1

  1. Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices

    E-Print Network [OSTI]

    Noel, Steven

    Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices Steven Noel}@gmu.edu Abstract We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show attacker reachability across

  2. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect (OSTI)

    Peng Liu

    2005-11-28T23:59:59.000Z

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  3. Towards Attack-Agnostic Defenses David Brumley and Dawn Song

    E-Print Network [OSTI]

    Brumley, David

    Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract Internet attackers control hundreds of thousands to per- haps millions of computers, which they can use for a va- riety of different attacks. Common attacks include spam delivery, phishing, and DDo

  4. A Probabilistic Routing Disruption Attack on DSR and Its Analysis

    E-Print Network [OSTI]

    Levi, Albert

    A Probabilistic Routing Disruption Attack on DSR and Its Analysis Ă?zleyi Ocakolu, Burak Bayolu}@sabanciuniv.edu Abstract -- In this paper, we propose an attack model against DSR ad hoc network routing protocol and analyze the effects of this attack model on DSR route discovery mechanism. The analysis of the attack

  5. The GHS Attack in odd Characteristic March 24, 2003

    E-Print Network [OSTI]

    Diem, Claus

    The GHS Attack in odd Characteristic Claus Diem March 24, 2003 Abstract The GHS attack is originally an approach to attack the discrete- logarithm problem (DLP) in the group of rational points. In this article we give a generalization of the attack to degree 0 class groups of (hyper-)elliptic curves over

  6. BAAP: Blackhole Attack Avoidance Protocol for Wireless Network

    E-Print Network [OSTI]

    Dharmaraja, S.

    BAAP: Blackhole Attack Avoidance Protocol for Wireless Network Saurabh Gupta Indian Institute infrastructure in adhoc net- work makes it vulnerable to various attacks. MANET routing disrupts attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh

  7. Attack Containment Framework for Large-Scale Critical Infrastructures

    E-Print Network [OSTI]

    Nahrstedt, Klara

    Attack Containment Framework for Large-Scale Critical Infrastructures Hoang Nguyen Department-- We present an attack containment framework against value-changing attacks in large-scale critical structure, called attack container, which captures the trust behavior of a group of nodes and assists

  8. On the Capacity Game of Private Fingerprinting Systems under Collusion Attacks

    E-Print Network [OSTI]

    Merhav, Neri

    On the Capacity Game of Private Fingerprinting Systems under Collusion Attacks Anelia Somekh;ngerprints in order not to be detected. Their action is modelled by a multiple access channel (MAC- Capacity, coding with side information, error exponents, information hiding, MMI decoder, private

  9. X-CSIT: a toolkit for simulating 2D pixel detectors

    E-Print Network [OSTI]

    Joy, Ashley; Hauf, Steffen; Kuster, Markus; Rüter, Tonn

    2015-01-01T23:59:59.000Z

    A new, modular toolkit for creating simulations of 2D X-ray pixel detectors, X-CSIT (X-ray Camera SImulation Toolkit), is being developed. The toolkit uses three sequential simulations of detector processes which model photon interactions, electron charge cloud spreading with a high charge density plasma model and common electronic components used in detector readout. In addition, because of the wide variety in pixel detector design, X-CSIT has been designed as a modular platform so that existing functions can be modified or additional functionality added if the specific design of a detector demands it. X-CSIT will be used to create simulations of the detectors at the European XFEL, including three bespoke 2D detectors: the Adaptive Gain Integrating Pixel Detector (AGIPD), Large Pixel Detector (LPD) and DePFET Sensor with Signal Compression (DSSC). These simulations will be used by the detector group at the European XFEL for detector characterisation and calibration. For this purpose, X-CSIT has been integrat...

  10. Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses

    E-Print Network [OSTI]

    Lessons Learned From Previous SSL/TLS Attacks A Brief Chronology Of Attacks And Weaknesses in 1994 the Secure Socket Layer (SSL) protocol (later renamed to Transport Layer Security (TLS)) evolved to the de facto standard for securing the transport layer. SSL/TLS can be used for ensuring data

  11. Attacks Against Process Control Systems: Risk Assessment, Detection, and Response

    E-Print Network [OSTI]

    Hu, Fei

    research problems for securing control systems when compared to securing traditional information technology technology (IT) systems connected to the physical world. Depending on the application, these control systems (DCS) or Cyber-Physical Systems (CPS) (to refer to embedded sensor and actuator networks). Control

  12. Attack of the Clones: Detecting Cloned Applications on Android Markets

    E-Print Network [OSTI]

    Chen, Hao

    subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energys National Nuclear Security as many as seven times. DNADroid has a very low false positive rate -- we manually confirmed that all, but much of the user experience relies on third-party applications. To this end, Android has numerous

  13. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles [ORNL; Beaver, Justin M [ORNL; Buckner, Mark A [ORNL; Morris, Thomas [Mississippi State University (MSU); Adhikari, Uttam [ORNL; Pan, Shengyi [Mississippi State University (MSU)

    2014-01-01T23:59:59.000Z

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  14. Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography

    E-Print Network [OSTI]

    Armand Niederberger; Valerio Scarani; Nicolas Gisin

    2005-04-15T23:59:59.000Z

    In practical quantum cryptography, the source sometimes produces multi-photon pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2->3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2->3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2->3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.

  15. Threshold Verification Technique for Network Intrusion Detection System

    E-Print Network [OSTI]

    Faizal, M A; Shahrin, S; Robiah, Y; Rahayu, S Siti; Nazrulazhar, B

    2009-01-01T23:59:59.000Z

    Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for I...

  16. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack

    E-Print Network [OSTI]

    Duan, Yitao; Canny, J

    2006-01-01T23:59:59.000Z

    adaptive chosen ciphertext attack. In: CRYPTO 1998. Volumeagainst chosen cipher- text attack. J. Cryptology 15 (2002)against chosen- ciphertext attacks. In: ASIACRYPT 2001.

  17. The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General

    E-Print Network [OSTI]

    Albiston, Catherine R.; Nielsen, Laura Beth

    2006-01-01T23:59:59.000Z

    emphasis added). Procedural Attack on Civil Rights contraryat 1 (1976). Procedural Attack on Civil Rights plaintiffs357, 367 & Procedural Attack on Civil Rights fee recovery

  18. Predicting the effect of climate change on wildfire behavior and initial attack success

    E-Print Network [OSTI]

    Fried, Jeremy S.

    2008-01-01T23:59:59.000Z

    wildfire behavior and initial attack success Van Rheenen, N.2006a. “Analysing initial attack on wildland fires usingwildfire behavior and initial attack success Fried, J.S. ,

  19. Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control

    E-Print Network [OSTI]

    Klimley, A. Peter

    477 CHAPTER 31 Responding to the Risk of White Shark Attack Updated Statistics, Prevention, Control ................................................................................................................................... 478 White Shark Attack Statistics........................................................................................................ 479 Definition of Shark Attack

  20. Heart Disease and Early Heart Attack Care

    E-Print Network [OSTI]

    Ohta, Shigemi

    Heart Disease and Early Heart Attack Care Pamela Kostic, RN, CCCC, Chest Pain Coordinator, Stony Risk Factors · EHAC & Prevention #12;Heart disease includes a number of problems affecting the heart and the blood vessels in the heart. #12;Types of heart disease include: · Coronary artery disease (CAD) · Angina

  1. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule

    E-Print Network [OSTI]

    Chen, Ing-Ray

    . Intrusion detection systems (IDSs) are security appliances that review audit data to identify cyber attacks is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness

  2. Toolkit for Installing Solar on K-12 Schools | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy SolarRadioactiveI Disposal Sites25, 2015Toolkit for

  3. A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED

    E-Print Network [OSTI]

    Fried, Jeremy S.

    A FOUNDATION FOR INITIAL ATTACK SIMULATION: THE FRIED AND FRIED FIRE CONTAINMENT MODEL Jeremy S, contemporary initial attack models, such as the California Fire Economics Simulator (CFES) ver- sion 2 simulation of any mathematically representable fire shape, provides for "head" and "tail" attack tactics

  4. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    E-Print Network [OSTI]

    Zenner, Erik

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack Gregor Leander, Mohamed Ahmed PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of the rounds. In this paper, we

  5. A Fast Eavesdropping Attack Against Touchscreens Federico Maggi

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Fast Eavesdropping Attack Against Touchscreens Federico Maggi Alberto Volpatto Politecnico di, we arise this concern by presenting an automatic attack against mod- ern touchscreen keyboards. We demonstrate the attack against the Apple iPhone--2010's most popular touchscreen device-- although it can

  6. Attack-Resilient Time Synchronization for Wireless Sensor Networks

    E-Print Network [OSTI]

    Yener, Aylin

    Attack-Resilient Time Synchronization for Wireless Sensor Networks Hui Song, Sencun Zhu in sensor networks were not designed with security in mind, thus leaving them vulnerable to security attacks. In this paper, we first identify various attacks that are effective to several representative time

  7. Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda Symantec Research Labs In its most general form, an attack signature is a program that can correctly determine if an input network packet se- quence can successfully attack a protected network appli- cation. Filter rules used

  8. Efficient DHT attack mitigation through peers' ID distribution

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Efficient DHT attack mitigation through peers' ID distribution Thibault Cholez, Isabelle Chrisment.festor}@loria.fr Abstract--We present a new solution to protect the widely deployed KAD DHT against localized attacks which DHT attacks by comparing real peers' ID distributions to the theoretical one thanks to the Kullback

  9. Extending the GHS Weil Descent Attack No Author Given

    E-Print Network [OSTI]

    Hess, Florian

    Extending the GHS Weil Descent Attack No Author Given No Institute Given Abstract. In this paper we extend the Weil descent attack due to Gaudry, Hess and Smart (GHS) to a much larger class of elliptic curves. This extended attack applies to elds of composite degree over F2 . The principle behind

  10. ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ICMP: an Attack Vector against IPsec Gateways Ludovic Jacquin Inria, France ludovic Protocol (ICMP) can be used as an attack vector against IPsec gateways. The main contribution of this work is to demonstrate that an attacker having eavesdropping and traffic injection capabilities in the black untrusted

  11. Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek

    E-Print Network [OSTI]

    Smith, Sean W.

    Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Dartmouth College Hanover, NH College Hanover, NH 03755 sws@cs.dartmouth.edu ABSTRACT Currently, work on malware attack and defense become the launching point for many attacks on the enterprise network in which the embedded devices

  12. On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks

    E-Print Network [OSTI]

    Bremler-Barr, Anat

    results as well. Keywords: DDoS, Network Hardware, Hash , Peacock, Cuckoo. 1 Introduction Modern high. Such network hardware elements are highly preferable targets for DDoS (Distributed Denial of Service) attacks with knowledge about how the system works, an attacker can perform a low-bandwidth sophisticated DDoS attack

  13. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01T23:59:59.000Z

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  14. An expanded framework for the advanced computational testing and simulation toolkit

    SciTech Connect (OSTI)

    Marques, Osni A.; Drummond, Leroy A.

    2003-11-09T23:59:59.000Z

    The Advanced Computational Testing and Simulation (ACTS) Toolkit is a set of computational tools developed primarily at DOE laboratories and is aimed at simplifying the solution of common and important computational problems. The use of the tools reduces the development time for new codes and the tools provide functionality that might not otherwise be available. This document outlines an agenda for expanding the scope of the ACTS Project based on lessons learned from current activities. Highlights of this agenda include peer-reviewed certification of new tools; finding tools to solve problems that are not currently addressed by the Toolkit; working in collaboration with other software initiatives and DOE computer facilities; expanding outreach efforts; promoting interoperability, further development of the tools; and improving functionality of the ACTS Information Center, among other tasks. The ultimate goal is to make the ACTS tools more widely used and more effective in solving DOE's and the nation's scientific problems through the creation of a reliable software infrastructure for scientific computing.

  15. A toolkit for integrated deterministic and probabilistic assessment for hydrogen infrastructure.

    SciTech Connect (OSTI)

    Groth, Katrina; Tchouvelev, Andrei V.

    2014-03-01T23:59:59.000Z

    There has been increasing interest in using Quantitative Risk Assessment [QRA] to help improve the safety of hydrogen infrastructure and applications. Hydrogen infrastructure for transportation (e.g. fueling fuel cell vehicles) or stationary (e.g. back-up power) applications is a relatively new area for application of QRA vs. traditional industrial production and use, and as a result there are few tools designed to enable QRA for this emerging sector. There are few existing QRA tools containing models that have been developed and validated for use in small-scale hydrogen applications. However, in the past several years, there has been significant progress in developing and validating deterministic physical and engineering models for hydrogen dispersion, ignition, and flame behavior. In parallel, there has been progress in developing defensible probabilistic models for the occurrence of events such as hydrogen release and ignition. While models and data are available, using this information is difficult due to a lack of readily available tools for integrating deterministic and probabilistic components into a single analysis framework. This paper discusses the first steps in building an integrated toolkit for performing QRA on hydrogen transportation technologies and suggests directions for extending the toolkit.

  16. Third Party CNOT Attack on MDI QKD

    E-Print Network [OSTI]

    Arpita Maitra

    2012-09-06T23:59:59.000Z

    In this letter, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). We study how one can suitably present an eavesdropping strategy on MDI QKD, that is in the direction of the fundamental CNOT attack on BB84 protocol, though our approach is quite different. In this strategy, Eve will be able to know expected half of the secret bits communicated between Alice and Bob with certainty (probability 1) without introducing any error. Further, for the remaining bits, where Eve will only be able to predict the bit values as in random guess (with probability 1/2), she will certainly find out whether her interaction induced an error in the secret bits between the communicating parties. Given the asymmetric nature of the CNOT attack, we also introduce Hadamard gates to present a symmetric version. Though our analysis does not refute the security claims in MDI QKD, adapting the CNOT attack in this scenario requires nontrivial approach using entanglement swapping.

  17. ICC 2006 SUBMISSION 1 On the Impact of Low-Rate Attacks

    E-Print Network [OSTI]

    Guirguis, Mina S. - Department of Computer Science, Texas State University

    -Rate Attacks; I. INTRODUCTION Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks study the impact of these new breeds of attacks and the extent to which defense mechanisms are capable potentially have high attack potency per attack burst. Our analysis is focused towards worst-case scenarios

  18. Multiple-Photon Absorption Attack on Entanglement-Based Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-02-16T23:59:59.000Z

    In elaborating on the multiple-photon absorption attack on Ekert protocol proposed in arXiv:1011.4740, we show that it can be used in other entanglement-based protocols, in particular the BBM92 protocol. In this attack, the eavesdropper (Eve) is assumed to be in control of the source, and she sends pulses correlated in polarization (but not entangled) containing several photons at frequencies for which only multiple-photon absorptions are possible in Alice's and Bob's detectors. Whenever the photons stemming from one pulse are dispatched in such a way that the number of photons is insufficient to trigger a multiple-photon absorption in either channel, the pulse remains undetected. We show that this simple feature is enough to reproduce the type of statistics on the detected pulses that are considered as indicating a secure quantum key distribution, even though the source is actually a mixture of separable states. The violation of Bell inequalities measured by Alice and Bob increases with the order of the multiple-photon absorption that Eve can drive into their detectors, while the measured quantum bit error rate decreases as a function of the same variable. We show that the attack can be successful even in the simplest case of a two-photon absorption or three-photon absorption attack, and we discuss possible countermeasures, in particular the use of a fair sampling test.

  19. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    E-Print Network [OSTI]

    Teixeira, André; Sandberg, Henrik; Johansson, Karl H

    2010-01-01T23:59:59.000Z

    The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication channels. Therefore cyber security for state estimators becomes an important issue. In this paper we analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network. Current EMS state estimation algorithms have bad data detection (BDD) schemes to detect outliers in the measurement data. Such schemes are based on high measurement redundancy. Although these methods may detect a set of basic cyber attacks, they may fail in the presence of an intelligent attacker. We explore the latter by considering scenarios where stealthy de...

  20. The Impact of Imperfect Information on Network Attack

    E-Print Network [OSTI]

    Melchionna, Andrew; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2014-01-01T23:59:59.000Z

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erd\\H{o}s-R\\'enyi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erd\\H{o}os-R\\'enyi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  1. Advancements in Wind Integration Study Data Modeling: The Wind Integration National Dataset (WIND) Toolkit; Preprint

    SciTech Connect (OSTI)

    Draxl, C.; Hodge, B. M.; Orwig, K.; Jones, W.; Searight, K.; Getman, D.; Harrold, S.; McCaa, J.; Cline, J.; Clark, C.

    2013-10-01T23:59:59.000Z

    Regional wind integration studies in the United States require detailed wind power output data at many locations to perform simulations of how the power system will operate under high-penetration scenarios. The wind data sets that serve as inputs into the study must realistically reflect the ramping characteristics, spatial and temporal correlations, and capacity factors of the simulated wind plants, as well as be time synchronized with available load profiles. The Wind Integration National Dataset (WIND) Toolkit described in this paper fulfills these requirements. A wind resource dataset, wind power production time series, and simulated forecasts from a numerical weather prediction model run on a nationwide 2-km grid at 5-min resolution will be made publicly available for more than 110,000 onshore and offshore wind power production sites.

  2. Continuous Time Bayesian Networks for Host Level Network Intrusion Detection

    E-Print Network [OSTI]

    Shelton, Christian R.

    R. Shelton Department of Computer Science and Engineering University of California, Riverside continuous time Bayesian networks learned from historic non-attack data and flag future event sequences whose. In this paper, we look at the problem of detecting such attacks at the host level. Instead of constructing

  3. Fake state attack on practically decoy state quantum key distribution

    E-Print Network [OSTI]

    Yong-gang Tan

    2012-02-15T23:59:59.000Z

    In this paper, security of practically decoy state quantum key distribution under fake state attack is considered. If quantum key distribution is insecure under this type of attack, decoy sources can not also provide it with enough security. Strictly analysis shows that Eve should eavesdrop with the aid of photon-number-resolving instruments. In practical implementation of decoy state quantum key distribution where statistical fluctuation is considered, however, Eve can attack it successfully with threshold detectors.

  4. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  5. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F. (Schenectady, NY); Buono, Donald P. (Schenectady, NY)

    1983-01-01T23:59:59.000Z

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  6. attack model development: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    than the traditional alert correlations. Wei Yan 89 Stealthy Deception Attacks on Water SCADA Systems Computer Technologies and Information Sciences Websites Summary: (more than...

  7. Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Too Big or Too Small? The PTB-PTS ICMP-based Attack against IPsec Gateways Ludovic Jacquin Inria the "Packet Too Big"-"Packet Too Small" ICMP based attack against IPsec gateways. We explain how an attacker in use, the attack either creates a Denial of Service or major performance penalties. This attack

  8. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M. (Sandia National Laboratories, Albuquerque, NM); Ehlen, Mark Andrew (Sandia National Laboratories, Albuquerque, NM); Boggs, Paul T.; Ray, Jaideep

    2009-10-01T23:59:59.000Z

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  9. A Full Key Recovery Attack on HMAC-AURORA-512

    E-Print Network [OSTI]

    A Full Key Recovery Attack on HMAC-AURORA-512 Yu Sasaki NTT Information Sharing Platform.yu@lab.ntt.co.jp Abstract. In this note, we present a full key recovery attack on HMAC- AURORA-512 when 512-bit secret keys is 2259 AURORA-512 operations, which is significantly less than the complexity of the exhaustive search

  10. Defending Systems Against Application-Level Denial of Service Attacks

    E-Print Network [OSTI]

    Keidar, Idit

    Systems Against Application-Level Denial of Service Attacks Research Thesis Submitted in Partial of the Technion -- Israel Institute of Technology HESHVAN 5768 HAIFA NOVEMBER 2007 #12;#12;The Research Thesis with a Single Port . . . . . . . . . . . 66 5.3.1 Blind Attack

  11. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  12. Avoiding the Detector Blinding Attack on Quantum Cryptography

    E-Print Network [OSTI]

    Z L Yuan; J F Dynes; A J Shields

    2010-09-30T23:59:59.000Z

    We show the detector blinding attack by Lydersen et al [1] will be ineffective on most single photon avalanche photodiodes (APDs) and certainly ineffective on any detectors that are operated correctly. The attack is only successful if a redundant resistor is included in series with the APD, or if the detector discrimination levels are set inappropriately.

  13. Combined Modeling and Side Channel Attacks on Strong PUFs

    E-Print Network [OSTI]

    , unknown to the adversary. This requirement can be difficult to uphold in practice: Physical attacks like- tacks on PUF core properties have been reported. They con- cern their physical and digital unclonability, for example, we report successful attacks for bitlengths of 64, 128 and 256, and for up to nine single Arbiter

  14. Thomas E. Hinds Although many diseases attack aspen, relatively few

    E-Print Network [OSTI]

    DISEASES Thomas E. Hinds Although many diseases attack aspen, relatively few kill or seriously of aspen, whereas there are subtle differ- ences in distribution between the important decay fungi. Foliage Diseases Fungus Diseases Many fungi are capable of attacking aspen leaves, from juvenile growth

  15. Energy Attacks and Defense Techniques for Wireless Systems

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    propose a hardware- based energy attack, namely energy hardware Trojans (HTs), which can be well hidden of these applications, security and integrity of the devices have become a critical concern. Due to the mobile and wire the phone. We target on the energy attacks on wireless systems caused by hardware Trojans (HTs), which

  16. Heart Attack Survival Plan Information To Share With

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Heart Attack Survival Plan Information To Share With Emergency Personnel/Hospital Staff Medicines in Time to Heart Attack Signs In partnership with: The National Council on the Aging U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES Public Health Service National Institutes of Health National Heart, Lung

  17. Cardiologists from CU testing revolutionary heart-attack treatment

    E-Print Network [OSTI]

    Cerveny, Vlastislav

    Cardiologists from CU testing revolutionary heart-attack treatment Compiled 4.12.2013 23 of the biologically degradable stent in the treatment of myocardial infarctions (heart-attacks). The results with a metal stent in their heart for the rest of their life; instead, the stent does its work then disappears

  18. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Agarwal, Pankaj K.

    , such as an Electromagnetic Pulse (EMP) attack. Large- scale disasters are likely to destroy network equipment and to severely--Network survivability, geographic networks, network design, Electromagnetic Pulse (EMP), computational geometry. I, such as an Electromagnetic Pulse (EMP) attack, as well as natural disasters, such as earth- quakes, hurricanes or floods [1

  19. Fault and Side-Channel Attacks on Pairing Based Cryptography ?

    E-Print Network [OSTI]

    such devices will be carried into and used in hostile environments and often house sensitive information devices need to be aware of similar problems in their operational environments. We can extend this passive information as passive attacks. Although side-channel attack and defence techniques are becoming increas

  20. Property Rights, Taxpayer Rights, and the Multiscalar Attack on the State: Consequences for Regionalism in the United States

    E-Print Network [OSTI]

    Christopher Niedt; Margaret Weir

    2007-01-01T23:59:59.000Z

    and the Multiscalar Attack on the State: Consequences forand the multiscalar attack on the state: Consequences forand the multiscalar attack on the state: Consequences for

  1. acoustic detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at least four hours before actual failure. Nathan Ida Razvan Ciocan 94 DETECTION OF CORROSION ATTACK ON OIL TANKERS BY MEANS OF ACOUSTIC EMISSION (AE) CiteSeer Summary: The...

  2. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  3. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z. (Mathematics and Computer Science); (FNAL); (Univ. of Wisconsin at Madison)

    2011-01-01T23:59:59.000Z

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  4. Minimum State Awareness for Resilient Control Systems Under Cyber-Attack

    SciTech Connect (OSTI)

    Kisner, Roger [ORNL; Fugate, David L [ORNL; McIntyre, Timothy J [ORNL

    2012-01-01T23:59:59.000Z

    State awareness for a control system is the accurate knowledge of the internal states of the system realization. To maintain stable operation, a controller requires a certain degree of state awareness. By definition, a cyber-attacker decreases the state awareness by modifying or removing the information available to the operator and control system. By doing so, the attacker can directly cause damage to the physical system through the control system, or indirectly by causing the operator to react in a damaging manner to the false information. In a number of recent papers, detection and mitigation strategies have been proposed that assume state awareness. The goal of the attacker to reduce or remove state awareness makes this assumption invalid for most situations. One of the central problems of resilient control is developing methods to retain sufficient state awareness to continue operation during a cyberattack. In this paper, we will define state awareness, discuss the consequences of loss of state awareness, and some potential research directions for maintaining state awareness.

  5. E-Print Network 3.0 - abdool karim attacking Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    . We further describe specific attacks on two existing proposals, namely SWATT and ICE-based schemes... , and ar- gue about the difficulty of fixing them. All attacks...

  6. YT: A Multi-Code Analysis Toolkit for Astrophysical Simulation Data

    SciTech Connect (OSTI)

    Turk, Matthew J.; /San Diego, CASS; Smith, Britton D.; /Michigan State U.; Oishi, Jeffrey S.; /KIPAC, Menlo Park /Stanford U., Phys. Dept.; Skory, Stephen; Skillman, Samuel W.; /Colorado U., CASA; Abel, Tom; /KIPAC, Menlo Park /Stanford U., Phys. Dept.; Norman, Michael L.; /aff San Diego, CASS

    2011-06-23T23:59:59.000Z

    The analysis of complex multiphysics astrophysical simulations presents a unique and rapidly growing set of challenges: reproducibility, parallelization, and vast increases in data size and complexity chief among them. In order to meet these challenges, and in order to open up new avenues for collaboration between users of multiple simulation platforms, we present yt (available at http://yt.enzotools.org/) an open source, community-developed astrophysical analysis and visualization toolkit. Analysis and visualization with yt are oriented around physically relevant quantities rather than quantities native to astrophysical simulation codes. While originally designed for handling Enzo's structure adaptive mesh refinement data, yt has been extended to work with several different simulation methods and simulation codes including Orion, RAMSES, and FLASH. We report on its methods for reading, handling, and visualizing data, including projections, multivariate volume rendering, multi-dimensional histograms, halo finding, light cone generation, and topologically connected isocontour identification. Furthermore, we discuss the underlying algorithms yt uses for processing and visualizing data, and its mechanisms for parallelization of analysis tasks.

  7. Network-Level Polymorphic Shellcode Detection Using Emulation

    E-Print Network [OSTI]

    Markatos, Evangelos P.

    to the attack vector. We present a heuristic detection method that scans network traffic streams that makes it self-decrypting. Since the decryptor itself cannot be encrypted, some detection approaches rely such as self-modifying code. 2 Related Work Network intrusion detection systems (NIDS) like Snort [12] have

  8. Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Use theT.I.M.E. Method To Help Your Patients Make a Heart Attack Survival Plan Act in Time to Heart Attack Signs Why Your Patients Need To Act in Time to Heart Attack Signs Coronary heart disease a heart attack. About 460,000 of those heart attacks are fatal. Disability and death from heart attack can

  9. On the Complexity of Matsui's Attack Pascal Junod

    E-Print Network [OSTI]

    On the Complexity of Matsui's Attack Pascal Junod Security and Cryptography Laboratory Swiss at random and where depends on the key value. Given some plaintext bits Pi1 , . . . , Pir , ciphertext bits

  10. Guessing Attacks and the Computational Soundness of Static Equivalence

    E-Print Network [OSTI]

    Warinschi, Bogdan

    Guessing Attacks and the Computational Soundness of Static Equivalence Martin Abadi1 , Mathieu static equivalence. Static equivalence depends on an underlying equa- tional theory. The choice, fundamental cryp- tographic operations. This equational theory yields a notion of static equivalence

  11. On countermeasures of worm attacks over the Internet 

    E-Print Network [OSTI]

    Yu, Wei

    2009-05-15T23:59:59.000Z

    Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service disruptions and damage. Thus, research on modeling ...

  12. Practical Attacks on Digital Signatures Using MD5 Message Digest

    E-Print Network [OSTI]

    schemes based on MD5 message digest on an example using GPG. Keywords: collision, hash function, MD5 1 on digital signatures on an example using GPG (section 5) and finally an exam- ple of real-world attack

  13. Active Attacks Against Modulation-based Radiometric Identification

    E-Print Network [OSTI]

    Bystroff, Chris

    ) may become compromised via physical attacks. In light of these difficulties, researchers have started Science Technical Report 09-02 Matthew Edman and B¨ulent Yener Rensselaer Polytechnic Institute Department

  14. Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks

    E-Print Network [OSTI]

    Hay, David

    Network Vulnerability to Single, Multiple, and Probabilistic Physical Attacks Pankaj K. Agarwal, swami}@cs.arizona.edu Electrical Engineering, Columbia University. {hdavid, gil}@ee.columbia.edu Abstract--Telecommunications networks heavily rely on the physical infrastructure and, are therefore

  15. Coordinated Variable Structure Switching Attacks for Smart Grid 

    E-Print Network [OSTI]

    Liu, Shan

    2013-02-11T23:59:59.000Z

    The effective modeling and analysis of large-scale power system disturbances especially those stemming from intentional attack represents an open engineering and research problem. Challenges stem from the need to develop ...

  16. Simulation and modeling for the stand-off radiation detection system (SORDS) using GEANT4

    SciTech Connect (OSTI)

    Hoover, Andrew S [Los Alamos National Laboratory; Wallace, Mark [Los Alamos National Laboratory; Galassi, Mark [Los Alamos National Laboratory; Mocko, Michal [Los Alamos National Laboratory; Palmer, David [Los Alamos National Laboratory; Schultz, Larry [Los Alamos National Laboratory; Tornga, Shawn [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    A Stand-Off Radiation Detection System (SORDS) is being developed through a joint effort by Raytheon, Los Alamos National Laboratory, Bubble Technology Industries, Radiation Monitoring Devices, and the Massachusetts Institute of Technology, for the Domestic Nuclear Detection Office (DNDO). The system is a mobile truck-based platform performing detection, imaging, and spectroscopic identification of gamma-ray sources. A Tri-Modal Imaging (TMI) approach combines active-mask coded aperture imaging, Compton imaging, and shadow imaging techniques. Monte Carlo simulation and modeling using the GEANT4 toolkit was used to generate realistic data for the development of imaging algorithms and associated software code.

  17. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  18. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  19. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes Patrick Bas powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies to be able to handle `complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated

  20. New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b

    E-Print Network [OSTI]

    Moulin, Pierre

    New sensitivity analysis attack Maha El Choubassi a and Pierre Moulin b University of Illinois analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector

  1. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Miller, Barton P.

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature-based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  2. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack

    E-Print Network [OSTI]

    Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo,kkhoongm,lchuanwe@dso.org.sg Abstract. In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits

  3. High-speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Chao, Jonathan

    High-speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim',Ju-Yeon Jo', H during the Distributed Denial-oJService (DDoS) attack. By allocating bandwidths separately for TCP.9% of the attack trafic while legitimate traflc showed nearly identical performance as in the non-attacked

  4. CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment

    E-Print Network [OSTI]

    Eustice, Ryan

    CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment Qi Chen, Wenmin Lin-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack

  5. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks Jakob Eriksson attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to this attack use tight clock synchronization

  6. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  7. Analyzing the Security in the GSM Radio Network using Attack Jungles

    E-Print Network [OSTI]

    Abdulla, Parosh Aziz

    Analyzing the Security in the GSM Radio Network using Attack Jungles Parosh Aziz Abdulla1 introduce the concept of attack jungles, which is a formalism for systematic representation of the vulnerabilities of systems. An attack jungle is a graph representation of all ways in which an attacker

  8. A Single-Key Attack on 6-Round KASUMI Teruo Saito1

    E-Print Network [OSTI]

    A Single-Key Attack on 6-Round KASUMI Teruo Saito1 NEC Software Hokuriku, Ltd. 1, Anyoji, Hakusan. In 2010, a related-key attack on full KASUMI was reported. The attack was very powerful and worked in practical complexity. However the attack was not a direct threat to full KASUMI because of the impractical

  9. Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    Attack Generation for NIDS Testing Using Natural Deduction Shai Rubin, Somesh Jha and Barton P. Miller January 23, 2004 Abstract A common way to elude a signature­based NIDS is to transform an attack matching between the attack payload and the NIDS signature, attackers split the payload into several TCP

  10. Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Successful Attack on an FPGA-based WDDL DES Cryptoprocessor Without Place and Route Constraints method to improve Side Channel Attacks (SCAs) on Dual-rail with Precharge Logic (DPL) countermeasure to perform advanced attacks. We have experimentally validated the proposed method by attacking a DES

  11. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  12. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance

  13. Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1

    E-Print Network [OSTI]

    Zhang, Jian

    Gaussian Process Learning for Cyber-Attack Early Warning Jian Zhang1 , Phillip Porras1 , Johannes- gressive attack sources, as such information can help to proactively defend their networks. For this pur of attacks observed by others. However, the total number of reported attackers is huge in these systems. Thus

  14. Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem, University College Cork Email: {e.popovici}@ucc.ie Abstract-- Side channel attacks such as Simple Power Analy- sis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms

  15. Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Entropy-based Power Attack Houssem Maghrebi, Sylvain Guilley, Jean-Luc Danger, Florent Flament D to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance anal- ysis to information- theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives

  16. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on di#erent cryptosystems. Recently, the principle of combined attacks#erent fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  17. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

  18. Combined Attacks on the AES Key Schedule Francois Dassance and Alexandre Venelli

    E-Print Network [OSTI]

    of physical attack is the Fault Analysis (FA) that evaluates the faulty behavior of a cryptosystem to learn proposed to thwart physical attacks on different cryptosystems. Recently, the principle of combined attacks different fault models. We report countermeasures against these attacks on AES in Section 5. We conclude

  19. Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks

    E-Print Network [OSTI]

    Stehr, Mark-Oliver

    Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks is forcibly asked by an attacker to reveal the key. These attacks, known as rubber hose cryptanalysis with conference proceedings. So-called rubber hose attacks have long been the bane of security systems

  20. Learn What a Heart Attack Feels Like--It Could Save Your Life.

    E-Print Network [OSTI]

    Bandettini, Peter A.

    Learn What a Heart Attack Feels Like-- It Could Save Your Life. This fact sheet tells you about heart attack signs. It also tells you what to do if you are having any of these signs. Take these steps. They could save your life. 1. Know the signs of a heart attack. 2. Understand that heart attacks are not all

  1. Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems

    E-Print Network [OSTI]

    Peisert, Sean

    ) for protecting automated distribution systems (ADS) against certain types of cyber attacks in a new way, distribution au- tomation, network security, intrusion detection systems. I. INTRODUCTION A. Scope and Goals their development with that of an appropriate cyber security frame- work that would prevent attackers from gaining

  2. Secure Proximity Detection for NFC Devices based on Ambient Sensor Data

    E-Print Network [OSTI]

    Saxena, Nitesh

    relay attack against such systems. In this paper, we develop secure proximity detection techniques based sensors. Keywords: NFC, RFID, relay attacks, context awareness, sensors 1 Introduction Radio Frequency launching test programs of NFC based payment system in the US [8]. It is predicted that mobile payments

  3. IMS 2006 -IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety

    E-Print Network [OSTI]

    of sensors for detecting a nuclear, biological, or chemical (NBC) attack in a dense ur- ban environment and localize a nuclear, biological or chemical (NBC) attack in an urban environment. Currently the Defense Threat Reduction Agency of the U.S. Army Nuclear and Chemical Agency [1]. Their efforts resulted

  4. HCIL Technical Report No. 99-07 (May 1999); http://www.cs.umd.edu/hcil Jazz: An Extensible 2D+Zooming Graphics Toolkit in Java

    E-Print Network [OSTI]

    Golbeck, Jennifer

    of energy has gone into building tools that support 3D graphics. This is largely due to the complexity of 3D+Zooming Graphics Toolkit in Java Benjamin B. Bederson, Britt McAlister Human-Computer Interaction Lab, Institute that supports applications using zooming object-oriented 2D graphics. It is built entirely in Java using Java2D

  5. Performance Evaluation of DCA and SRC on a Single Bot Detection

    E-Print Network [OSTI]

    Aickelin, Uwe

    a better performance in detecting malicious activities. Keywords: Security, Intrusion Detection, Botnet/bot techniques use different types of signatures-based detection by analysing network traffic in order to detect or encrypting the bot's traffic when communicating with the attacker. In addition, a bot can connect to non

  6. A fundamental threat to quantum cryptography: gravitational attacks

    E-Print Network [OSTI]

    R. Plaga

    2006-03-26T23:59:59.000Z

    An attack on the ``Bennett-Brassard 84''(BB84) quantum key-exchange protocol in which Eve exploits the action of gravitation to infer information about the quantum-mechanical state of the qubit exchanged between Alice and Bob, is described. It is demonstrated that the known laws of physics do not allow to describe the attack. Without making assumptions that are not based on broad consensus, the laws of quantum gravity, unknown up to now, would be needed even for an approximate treatment. Therefore, it is currently not possible to predict with any confidence if information gained in this attack will allow to break BB84. Contrary to previous belief, a proof of the perfect security of BB84 cannot be based on the assumption that the known laws of physics are strictly correct, yet.

  7. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    SciTech Connect (OSTI)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo'; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10T23:59:59.000Z

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  8. Resilience of Social Networks Under Different Attack Strategies

    E-Print Network [OSTI]

    Latif, Mohammad Ayub; Zaidi, Faraz

    2014-01-01T23:59:59.000Z

    Recent years have seen the world become a closely connected society with the emergence of different types of social networks. Online social networks have provided a way to bridge long distances and establish numerous communication channels which were not possible earlier. These networks exhibit interesting behavior under intentional attacks and random failures where different structural properties influence the resilience in different ways. In this paper, we perform two sets of experiments and draw conclusions from the results pertaining to the resilience of social networks. The first experiment performs a comparative analysis of four different classes of networks namely small world networks, scale free networks, small world-scale free networks and random networks with four semantically different social networks under different attack strategies. The second experiment compares the resilience of these semantically different social networks under different attack strategies. Empirical analysis reveals interesti...

  9. Intrusion Detection via Static Analysis David Wagner

    E-Print Network [OSTI]

    Wagner, David

    Xerox PARC ddean@parc.xerox.com Abstract One of the primary challenges in intrusion detection degree of automation, pro­ tection against a broad class of attacks based on corrupted code. Beginning with Sun's introduction of the Java language and its support of mobile code in 1995, pro­ gramming

  10. Proof-of-principle experiment of a modified photon-number-splitting attack against quantum key distribution

    SciTech Connect (OSTI)

    Liu Weitao; Sun Shihai; Liang Linmei; Yuan Jianmin [Department of Physics, College of Science, National University of Defense Technology, Changsha, 410073 (China)

    2011-04-15T23:59:59.000Z

    Any imperfections in a practical quantum key distribution (QKD) system may be exploited by an eavesdropper to collect information about the key without being discovered. We propose a modified photon-number-splitting attack scheme against QKD systems based on weak laser pulses taking advantage of possible multiphoton pulses. Proof-of-principle experiments are demonstrated. The results show that the eavesdropper can get information about the key generated between the legitimate parties without being detected. Since the equivalent attenuation introduced by the eavesdropper for pulses of different average photon numbers are different, the decoy-state method is effective in fighting against this kind of attack. This has also been proven in our experiments.

  11. Design and Fabrication of Cherenkov Counters for the Detection of SNM

    SciTech Connect (OSTI)

    Erickson, Anna S.; Lanza, Richard [Massachusetts Institute of Technology, 77 Massachusetts Ave., Cambridge, MA 02139 (United States); Galaitsis, Anthony; Hynes, Michael; Blackburn, Brandon [Raytheon IDS, 50 Apple Hill Drive, Tewksbury, MA 01876 (United States); Bernstein, Adam [Lawrence Livermore National Laboratory, 7000 East Avenue, Livermore, CA 94550 (United States)

    2011-12-13T23:59:59.000Z

    The need for large-size detectors for long-range active interrogation (AI) detection of SNM has generated interest in water-based detector technologies. Water Cherenkov Detectors (WCD) were selected for this research because of their transportability, scalability, and an inherent energy threshold. The detector design and analysis was completed using the Geant4 toolkit. It was demonstrated both computationally and experimentally that it is possible to use WCD to detect and characterize gamma rays. Absolute efficiency of the detector (with no energy cuts applied) was determined to be around 30% for a {sup 60}Co source.

  12. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09T23:59:59.000Z

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral “triggers” to help focus the analyst’s attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  13. ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ATTACK BY COLORIZATION OF A GREY-LEVEL IMAGE HIDING ITS COLOR PALETTE Chaumont M. and Puech W, FRANCE ABSTRACT In this paper, we present a novel attack named colorization attack. This attack of such an attack and thus to take it into account for the future color-hiding watermarking schemes. Index Terms

  14. DCA for Bot Detection

    E-Print Network [OSTI]

    Al-Hammadi, Yousof; Greensmith, Julie

    2010-01-01T23:59:59.000Z

    Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a 'bot' - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the 'botmaster of a botnet'. In this work, we use the biologically inspired Dendritic Cell Algorithm (DCA) to detect the existence of a single bot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the applica...

  15. Sequence Alignment for Masquerade Detection Scott E. Coull1

    E-Print Network [OSTI]

    Bystroff, Chris

    , however, these state-of-the-art security technologies are rendered useless. For instance, once a user has, administrators rely on security technologies such as firewalls, network and host-based intrusion detection technologies. Clearly, such attacks pose a serious threat, and their detection often occurs long after

  16. acoustic flame-out detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at least four hours before actual failure. Nathan Ida Razvan Ciocan 94 DETECTION OF CORROSION ATTACK ON OIL TANKERS BY MEANS OF ACOUSTIC EMISSION (AE) CiteSeer Summary: The...

  17. Detecting Botnets Through Log Correlation

    E-Print Network [OSTI]

    Al-Hammadi, Yousof

    2010-01-01T23:59:59.000Z

    Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (SSoS) attacks, keylogging, and backdoors. In response to these threats, new effective techniques are needed to detect the presence of botnets. In this paper, we have used an interception technique to monitor Windows Application Programming Interface (API) functions calls made by communication applications and store these calls with their arguments in log files. Our algorithm detects botnets based on monitoring abnormal activity by correlating the changes in log file sizes from different hosts.

  18. Ethnicity and gender in the face of a terrorist attack: A national longitudinal study of immediate responses and outcomes two years after September 11

    E-Print Network [OSTI]

    Chu, T Q; Seery, M D; Ence, W A; Holman, E A; Silver, Roxane Cohen

    2006-01-01T23:59:59.000Z

    reactions to terrorist attacks: Findings from the national11, 2001, terrorist attacks. New England Journal ofthe 9/11/01 terrorist attacks. Journal of Adolescent Health,

  19. Guessing Attacks and the Computational Soundness of Static Equivalence

    E-Print Network [OSTI]

    Abadi, MartĂ­n

    Guessing Attacks and the Computational Soundness of Static Equivalence Mart´in Abadi1 , Mathieu static equivalence. Static equivalence depends on an underlying equa- tional theory. The choice, fundamental cryp- tographic operations. This equational theory yields a notion of static equivalence

  20. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect (OSTI)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23T23:59:59.000Z

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  1. Defending against Unidentifiable Attacks in Electric Power Grids

    E-Print Network [OSTI]

    Li, Qun

    Defending against Unidentifiable Attacks in Electric Power Grids Zhengrui Qin, Student Member, IEEE THE electric power grid is a distribution network that connects the electric power generators to customers, Qun Li, Senior Member, IEEE, and Mooi-Choo Chuah, Senior Member, IEEE Abstract--The electric power

  2. Energy Attack on Server Systems Zhenyu Wu, Mengjun Xie

    E-Print Network [OSTI]

    Wang, Haining

    Power management is one of the critical issues for server systems nowadays. To date energy cost hasEnergy Attack on Server Systems Zhenyu Wu, Mengjun Xie , and Haining Wang The College of William server power consump- tion and achieve energy proportional computing. How- ever, the security perspective

  3. A Deception Framework for Survivability Against Next Generation Cyber Attacks

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    to the electronic business domain. According to the asymmetric warfare theory, attack- ers have the advantage- rity, survivability 1. Introduction This is the era of cyber-warfare and it is no longer limited to military domain. Knapp and Boulton [12] have reviewed information warfare literature from 1990 to mid-2005

  4. Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    Dynamic Malware Attack in Energy-Constrained Mobile Wireless Networks M.H.R. Khouzani, Saswati Sarkar Abstract Large scale proliferation of wireless technologies are dependent on developing reliable to the spread of self-replicating malicious codes known as malware. The malware can be used to initiate

  5. Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures

    E-Print Network [OSTI]

    Caesar, Matthew

    range of sparsely located mobile nodes (e.g., disaster-response networks), and limited energy resources, DTNs are used for scientific, military, and industrial applications that place high demands against spoofing attacks in DTNs. To the best of our knowledge, we are the first to propose

  6. Selective Jamming Attacks in Wireless Networks Alejandro Proa~no

    E-Print Network [OSTI]

    Lazos, Loukas

    for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. I emission of high-power interference signals such as continuous wave tones, or FM modulated noise [15-one transformations [13], with physical-layer parameters. We further study the impact of various selective jamming

  7. Stealthy Deception Attacks on Water SCADA Systems Saurabh Amin

    E-Print Network [OSTI]

    day irrigation canal systems. This type of monitoring and control infrastructure is also commonStealthy Deception Attacks on Water SCADA Systems Saurabh Amin Department of CEE UC Berkeley, CA the vulnerabilities of Supervisory Control and Data Acquisition (SCADA) systems which mon- itor and control the modern

  8. Attacking Tor through Unpopular Ports Muhammad Aliyu Sulaiman

    E-Print Network [OSTI]

    Almulhem, Ahmad

    of them as entry (first) and exit (last) relays. With the currently large number of relays, this attack and the destination of the traffic: the first (entry) relay knows the source but not the destination, the last (exit and exit relays. Indeed, if the entry and exit relays traffic is observed, a simple traffic analysis can

  9. Offline Dictionary Attack on Password Authentication Schemes using Smart Cards

    E-Print Network [OSTI]

    decades of intensive research in the security community, and the current crux lies in how to achieve truly scenario and gives rise to the strongest adversary model so far (Note that Wang's PSCAV scheme is secure poorly-chosen passwords from the notorious offline dictionary attacks and thus confirms the feasibility

  10. PUF Modeling Attacks on Simulated and Silicon Data

    E-Print Network [OSTI]

    that rest on the Strong PUF's unpredictability and physical unclonability. Our method is less relevant these problems, but they all rest on the concept of a secret binary key: It is assumed that the Ulrich R API-attacks and viruses, can lead to key exposure and full security breaks. The fact that the devices

  11. De-anonymization attack on geolocated data Sebastien Gambs

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , inference attack, de- anonymization. I. INTRODUCTION With the recent advent of ubiquitous devices and smart.g., to optimize the placement of cellular towers, to conduct market and sociological studies or to analyze (such as his home and place of work) [5], [6], [7], [8], to predict his past, current and future

  12. On the robustness of network infrastructures to disasters and physical attacks

    E-Print Network [OSTI]

    Neumayer, Sebastian James

    2013-01-01T23:59:59.000Z

    Networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such realworld events happen in specific geographical locations ...

  13. Anthem Cyber Attack: Information and Call-in Phone Number | Jefferson...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Anthem Cyber Attack: Information and Call-in Phone Number Colleagues, As you may have heard by now, Anthem was the latest victim of a cyber attack. Anthem reports that they were...

  14. T-702: Apache web servers that allows a DOS attack | Department...

    Broader source: Energy.gov (indexed) [DOE]

    2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has...

  15. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  16. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  17. Robustness of two-way quantum communication protocols against Trojan horse attack

    E-Print Network [OSTI]

    Fu-Guo Deng; Ping Zhou; Xi-Han Li; Chun-Yan Li; Hong-Yu Zhou

    2005-08-23T23:59:59.000Z

    We discuss the robustness of two-way quantum communication protocols against Trojan horse attack and introduce a novel attack, delay-photon Trojan horse attack. Moreover, we present a practical way for two-way quantum communication protocols to prevent the eavesdropper from stealing the information transmitted with Trojan horse attacks. It means that two-way quantum communication protocols is also secure in a practical application.

  18. A 2nd-Preimage Attack on AURORA-512 NTT Information Sharing Platform Laboratories, NTT Corporation

    E-Print Network [OSTI]

    A 2nd-Preimage Attack on AURORA-512 Yu Sasaki NTT Information Sharing Platform Laboratories, NTT. In this note, we present a 2nd-preimage attack on AURORA- 512, which is one of the candidates for SHA-3. Our is approximately 2290 AURORA-512 operations, which is less than the brute force attack on AURORA-512, namely, 2512

  19. Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks

    E-Print Network [OSTI]

    Nam, Seung Yeob

    1 Enhanced ARP: Preventing ARP Poisoning-based Man-in-the-Middle Attacks Seung Yeob Nam, Member- tion Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks deployable. Index Terms--ARP cache poisoning, Man-in-the-Middle attack, ARP poisoning prevention, voting. I

  20. Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator as random masks generators in some side channel attacks countermeasures. As such, they must have good statistical properties, be unpredictable and robust against attacks. This paper presents a contact- less

  1. A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia

    E-Print Network [OSTI]

    Bullo, Francesco

    A Divide-and-Conquer Approach to Distributed Attack Identification Fabio Pasqualettia , Florian D, University of California, Santa Barbara Abstract Identifying attacks is key to ensure security in cyber-physical systems. In this note we remark upon the computational complexity of the attack identification problem

  2. Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack

    E-Print Network [OSTI]

    Henderson, Shane

    Allocating Capacity in Parallel Queues to Improve Their Resilience to Deliberate Attack W. Matthew will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well-informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service

  3. An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing

    E-Print Network [OSTI]

    Wing, Jeannette M.

    An Attack Surface Metric Pratyusa K. Manadhata and Jeannette M. Wing Carnegie Mellon University's security? We propose to use the measure of a system's attack surface as an indication of the system, prior work has shown that a system's attack surface measurement serves as a reliable proxy for security

  4. What about vulnerability to a fault attack of the Miller algorithm during an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

  5. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten Institut f¨ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace-zero group can always be transferred methods than by attacking it directly via generic methods. The speed-up one obtains corresponds

  6. Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems

    E-Print Network [OSTI]

    Dreibholz, Thomas

    Evaluation of Attack Countermeasures to Improve the DoS Robustness of RSerPool Systems attacks has not been intensively ad- dressed yet. In particular, there have not been any analyses for real the attack bandwidth which is necessary for a significant impact on RSerPool-based services. This analysis

  7. On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack

    E-Print Network [OSTI]

    On the Effectiveness of Low Latency Anonymous Network in the Presence of Timing Attack Jing Jin.e. anonymity) of all anonymous networks in the presence of timing attack. Our metric is based on a novel conducted real-time timing attacks on various deployed anonymous networks such as Tor, anonymizer

  8. An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace-Zero Cryptosystem Claus Diem and Jasper cryptographic primitive of the DLP in elliptic curves over prime fields. We present a novel attack calculus methods than by attacking it directly via generic methods. The speed-up one obtains

  9. What About Vulnerability to a Fault Attack of the Miller's Algorithm During an

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

  10. Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem

    E-Print Network [OSTI]

    Hess, Florian

    Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem F. Hess Technical succumb to the basic GHS attack, thereby weakening curves over F2155 further. We also discuss other possible extensions or variations of the GHS attack and conclude that they are not likely to yield further

  11. Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera

    E-Print Network [OSTI]

    Lindgren, Staffan

    Characteristics of subalpine fir susceptible to attack by western balsam bark beetle (Coleoptera beetle (Dryocoetes confusus Swaine) predominately attacked trees from the three to four largest diameter classes at each site. However, the mean diameter of attacked trees was significantly different among sites

  12. Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key

    E-Print Network [OSTI]

    Myasnikov, Aleksey

    Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol of Technology, Hoboken, New Jersey, USA, 07030 {amyasnik,aushakov}@stevens.edu Abstract. The length based attack and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced

  13. Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts Semantic Networks

    E-Print Network [OSTI]

    Ansari, Nirwan

    Extracting Attack Knowledge Using Principal-subordinate Consequence Tagging Case Grammar and Alerts networks from Distributed Denial of Service (DDoS) attacks has become a critical issue that must be tackled, the overwhelming volume of alerts makes it difficult for security administrators to analyze and extract the attack

  14. Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Using DISE to Protect Return Addresses from Attack Marc L. Corliss E Christopher Lewis Amir Roth- jack systems. Exploiting a bounds-unchecked copy into a stack buffer, an attacker can--by supplying of code of her choosing. In this paper, we propose to protect code from this common form of attack using

  15. A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar

    E-Print Network [OSTI]

    Wing, Jeannette M.

    A Formal Model for A System's Attack Surface Pratyusa K. Manadhata Dilsun K. Kaynar Jeannette M software [18]. In this paper, we propose to use a software system's attack surface measurement as an indicator of the system's security; the larger the attack surface, the more insecure the system. We

  16. Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa Sushil Jajodia

    E-Print Network [OSTI]

    Noel, Steven

    Multiple Coordinated Views for Network Attack Graphs Steven Noel Michael Jacobs Pramod Kalapa graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective techniques for visualizing such attack graphs

  17. On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller

    E-Print Network [OSTI]

    Liblit, Ben

    On the Completeness of Attack Mutation Algorithms Shai Rubin, Somesh Jha, and Barton P. Miller University of Wisconsin, Madison Computer Sciences Department {shai,jha,bart}@cs.wisc.edu Abstract An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances

  18. Discovering Novel Attack Strategies from INFOSEC Xinzhou Qin and Wenke Lee

    E-Print Network [OSTI]

    Lee, Wenke

    Discovering Novel Attack Strategies from INFOSEC Alerts Xinzhou Qin and Wenke Lee College. Correlating security alerts and discovering attack strategies are impor- tant and challenging tasks for security analysts. Recently, there have been several proposed techniques to analyze attack scenarios from

  19. Attack on Private Signature Keys of the OpenPGP format, PGPTM

    E-Print Network [OSTI]

    - 1 - Attack on Private Signature Keys of the OpenPGP format, PGPTM programs and other applications Prague, t.rosa@decros.cz Abstract. The article describes an attack on OpenPGP format, which leads these applications must undergo the same revision as the actual program PGPTM . The success of the attack

  20. An Attack on a TraceZero Cryptosystem Claus Diem and Jasper Scholten

    E-Print Network [OSTI]

    Diem, Claus

    An Attack on a Trace­Zero Cryptosystem Claus Diem and Jasper Scholten Institut fË?ur Experimentelle a novel attack on this primitive. We show that the DLP in the trace­zero group can always be transferred methods than by attacking it directly via generic methods. The speed­up one obtains corresponds

  1. High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack

    E-Print Network [OSTI]

    Merat, Francis L.

    1 High-Speed Router Filter for Blocking TCP Flooding under DDoS Attack Yoohwan Kim1 , Ju-Yeon Jo1 Polytechnic University, Brooklyn, NY 11201 ABSTRACT Protection from Distributed Denial-of-Service attacks has been of a great interest recently and substantial progress has been made for preventing some attack

  2. On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services

    E-Print Network [OSTI]

    Chang, Rocky Kow-Chuen

    On Generalized Low-Rate Denial-of-Quality Attack Against Internet Services Yajuan Tang, Xiapu Luo,csrchang}@comp.polyu.edu.hk, qing.hui@ttu.edu Abstract--Low-rate Denial of Quality (DoQ) attacks, by send- ing intermittent bursts generalize the previous results by considering arbitrary attack intervals. We obtain two sets of new results

  3. Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack

    E-Print Network [OSTI]

    Dessouky, Maged

    Facility Location under Demand Uncertainty: Response to a Large-scale Bioterror Attack Abstract In the event of a catastrophic bio-terror attack, major urban centers need to effi- ciently distribute large of a hypothetical anthrax attack in Los Angeles County. Keywords: Capacitated facility location, distance

  4. A Taxonomy of DDoS Attack and DDoS Defense Mechanisms

    E-Print Network [OSTI]

    Lee, Ruby B.

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem

  5. Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu

    E-Print Network [OSTI]

    Ning, Peng

    Learning Attack Strategies from Intrusion Alerts Peng Ning and Dingbang Xu Cyber Defense Laboratory@csc.ncsu.edu, dxu@unity.ncsu.edu Abstract Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks

  6. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  7. Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun

    E-Print Network [OSTI]

    Sun, Yan Lindsay

    Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun ECE research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries

  8. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Reiter, Michael

    the measurements of meters at physically protected locations such as substations, such attacks can introduce13 False Data Injection Attacks against State Estimation in Electric Power Grids YAO LIU and PENG also defeat malicious measurements injected by attackers. In this article, we expose an unknown

  9. False Data Injection Attacks against State Estimation in Electric Power Grids

    E-Print Network [OSTI]

    Ning, Peng

    the measurements of meters at physically protected locations such as substations, such attacks can introduceFalse Data Injection Attacks against State Estimation in Electric Power Grids Yao Liu and Peng Ning also defeat malicious measurements injected by attackers. In this paper, we expose an unknown

  10. Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation

    E-Print Network [OSTI]

    Kundur, Deepa

    Switched System Models for Coordinated Cyber-Physical Attack Construction and Simulation Shan Liu the need to develop intelligent models of cyber-physical attacks that produce salient disruptions. In this paper, we present a foundation for the development of a class of intelligent cyber-physical attacks

  11. The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses

    E-Print Network [OSTI]

    Saxena, Nitesh

    The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

  12. Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems

    E-Print Network [OSTI]

    Curtmola, Reza

    1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

  13. Sustaining Availability of Web Services under Distributed Denial of Service Attacks

    E-Print Network [OSTI]

    Vigoda, Eric

    adequate service to a large percentage of clients during DDoS attacks. The worst-case performance adversarial relationship between a DDoS adversary and the proposed system. We also conduct a simulation study (DDoS) attacks against high-pro#12;le web sites demonstrate how devastating DDoS attacks are, and how

  14. Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts

    E-Print Network [OSTI]

    Tsigas, Philippas

    S attack themselves. Here we study the case where the communicating parties have clocks with rate drift. The situa- tion is even worse with distributed denial of service(DDoS) attacks, where multiple compromised in order to make the service unavail- able [7]. Common methods to protect systems from DoS and DDoS attacks

  15. On the Effectiveness of DDoS Attacks on Statistical Temasek Laboratories

    E-Print Network [OSTI]

    Chang, Ee-Chien

    by the filter that guards the victim network. We study the effectiveness of DDoS attacks on such statistical first study the effectiveness of DDoS attacks on statistical-based filtering in a general context whereOn the Effectiveness of DDoS Attacks on Statistical Filtering Qiming Li Temasek Laboratories

  16. Non-Control-Data Attacks Are Realistic Threats , Emre C. Sezer

    E-Print Network [OSTI]

    Zhang, Xiangyu

    make systems susceptible to Internet worms and distributed denial of service (DDoS) attacks. Recipe, including FTP, SSH, Telnet, and HTTP servers, are vulnerable to such attacks. In each case, the generated them down, they have incentives to study and employ non-control-data attacks. This paper emphasizes

  17. Double blinding-attack on entanglement-based quantum key distribution protocols

    E-Print Network [OSTI]

    Guillaume Adenier; Irina Basieva; Andrei Yu. Khrennikov; Masanori Ohya; Noboru Watanabe

    2011-06-14T23:59:59.000Z

    We propose a double blinding-attack on entangled-based quantum key distribution protocols. The principle of the attack is the same as in existing blinding attack except that instead of blinding the detectors on one side only, Eve is blinding the detectors of both Alice and Bob. In the BBM92 protocol, the attack allows Eve to get a full knowledge of the key and remain undetected even if Alice and Bob are using 100% efficient detectors. The attack can be easily extended to Ekert protocol, with an efficiency as high as 85.3%.

  18. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry (Pittsburgh, PA); Attaar, Mustan (Monroeville, PA); Rishel, Rick D. (Monroeville, PA)

    1989-08-08T23:59:59.000Z

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  19. Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol

    E-Print Network [OSTI]

    Toyohiro Tsurumaru

    2006-12-25T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the "discretized gaussian" intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100km reported by Diamanti et al. turns out to be insecure. Moreover it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95km.

  20. Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator

    E-Print Network [OSTI]

    Mario Stip?evi?

    2014-07-10T23:59:59.000Z

    A particularly successful detector blinding attack has been recently demonstrated on various quantum key distribution (QKD) systems, performing for the first time an undetectable and complete recovery of the key. In this paper two original contributions are given to understanding and prevention of this attack.

  1. This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs.

    E-Print Network [OSTI]

    Bandettini, Peter A.

    #12;#12;#12;This lesson plan is part of the National Heart, Lung, and Blood Institute's (NHLBI) heart attack education campaign, Act in Time to Heart Attack Signs. It was designed to be the 10th session of an existing 9-session heart health education course for Latinos entitled Your Heart, Your Life

  2. A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. LaPorta

    E-Print Network [OSTI]

    Yener, Aylin

    1 A Taxonomy of Cyber Attacks on 3G Networks Kameswari Kotapati, Peng Liu, Yan Sun, Thomas F. La Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of Cross Infrastructure Cyber Attacks in addition to the standard Single

  3. 546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack?

    E-Print Network [OSTI]

    Ansari, Nirwan

    546 IEEE COMMUNICATIONS LETTERS, VOL. 13, NO. 7, JULY 2009 Is It Congestion or a DDoS Attack? Amey Shevtekar and Nirwan Ansari, Fellow, IEEE Abstract--We propose a new stealthy DDoS attack model referred to as the "quiet" attack. The attack traffic consists of TCP traffic only. Widely used botnets in today's various

  4. Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non-Repudiation Protocol

    E-Print Network [OSTI]

    Chen, Yu

    1 Enhancing Cloud Storage Security against Roll-back Attacks with A New Fair Multi-Party Non security issues in cloud storage: repudiation, fairness, and roll-back attacks. We proposed a novel fair and is capable of preventing roll-back attacks. Keywords: Cloud Storage, Non-repudiation, Roll-back Attack. 1

  5. Time Stamp Attack on Wide Area Monitoring System in Smart Grid

    E-Print Network [OSTI]

    Zhang, Zhenghao; Li, Husheng; Pei, Changxing

    2011-01-01T23:59:59.000Z

    Security becomes an extremely important issue in smart grid. To maintain the steady operation for smart power grid, massive measurement devices must be allocated widely among the power grid. Previous studies are focused on false data injection attack to the smart grid system. In practice, false data injection attack is not easy to implement, since it is not easy to hack the power grid data communication system. In this paper, we demonstrate that a novel time stamp attack is a practical and dangerous attack scheme for smart grid. Since most of measurement devices are equipped with global positioning system (GPS) to provide the time information of measurements, it is highly probable to attack the measurement system by spoofing the GPS. By employing the real measurement data in North American Power Grid, simulation results demonstrate the effectiveness of the time stamp attack on smart grid.

  6. Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks

    E-Print Network [OSTI]

    Ruj, Sushmita

    2015-01-01T23:59:59.000Z

    We model smart grids as complex interdependent networks, and study targeted attacks on smart grids for the first time. A smart grid consists of two networks: the power network and the communication network, interconnected by edges. Occurrence of failures (attacks) in one network triggers failures in the other network, and propagates in cascades across the networks. Such cascading failures can result in disintegration of either (or both) of the networks. Earlier works considered only random failures. In practical situations, an attacker is more likely to compromise nodes selectively. We study cascading failures in smart grids, where an attacker selectively compromises the nodes with probabilities proportional to their degrees; high degree nodes are compromised with higher probability. We mathematically analyze the sizes of the giant components of the networks under targeted attacks, and compare the results with the corresponding sizes under random attacks. We show that networks disintegrate faster for targeted...

  7. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01T23:59:59.000Z

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  8. Detecting Integrity Attacks on SCADA Systems Rohan Chabukswar, Yilin Mo, Bruno Sinopoli

    E-Print Network [OSTI]

    Sinopoli, Bruno

    susceptibilities in industrial control systems. In view of the present threat of global terrorism, a power grid. To validate the results, we apply our findings to an industrial control problem concerning a chemical plant and then a simplified model of a power system. Keywords: Cyber-Physical Systems, SCADA, Secure, Control 1. INTRODUCTION

  9. Paint for detection of corrosion and warning of chemical and radiological attack

    DOE Patents [OSTI]

    Farmer, Joseph C. (Tracy, CA)

    2010-08-24T23:59:59.000Z

    A system for warning of corrosion, chemical, or radiological substances. The system comprises painting a surface with a paint or coating that includes an indicator material and monitoring the surface for indications of the corrosion, chemical, or radiological substances.

  10. Eavesdropping Attack with Hong-Ou-Mandel Interferometer and Random Basis Shuffling in Quantum Key Distribution

    E-Print Network [OSTI]

    Chil-Min Kim; Yun Jin Choi; Young-Jai Park

    2006-03-02T23:59:59.000Z

    We introduce new sophisticated attacks with a Hong-Ou-Mandel interferometer against quantum key distribution (QKD) and propose a new QKD protocol grafted with random basis shuffling to block up those attacks. When the polarization basis is randomly and independently shuffled by sender and receiver, the new protocol can overcome the attacks even for not-so-weak coherent pulses. We estimate the number of photons to guarantee the security of the protocol.

  11. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks

    SciTech Connect (OSTI)

    Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

    2009-05-15T23:59:59.000Z

    A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

  12. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  13. Highly Efficient Quantum Key Distribution Immune to All Detector Attacks

    E-Print Network [OSTI]

    Wen-Fei Cao; Yi-Zheng Zhen; Yu-Lin Zheng; Zeng-Bing Chen; Nai-Le Liu; Kai Chen; Jian-Wei Pan

    2014-10-10T23:59:59.000Z

    Vulnerabilities and imperfections of single-photon detectors have been shown to compromise security for quantum key distribution (QKD). The measurement-device-independent QKD (MDI-QKD) appears to be the most appealing solution to solve the issues. However, in practice one faces severe obstacles of having significantly lower key generation rate, difficult two photon interferences, and remote synchronization etc. In this letter, we propose a highly efficient and simple quantum key distribution scheme to remove all of these drawbacks. Our proposal can be implemented with only small modifications over the standard decoy BB84 system. Remarkably it enjoys both the advantages of high key generation rate (being almost two orders of magnitude higher than that based on conventional MDI-QKD) comparable to the normal decoy system, and security against any detector side channel attacks. Most favorably one can achieve complete Bell state measurements with resort to single photon interference, which reduces significantly experimental costs. Our approach enables utilization of high speed and efficient secure communication, particularly in real-life scenario of both metropolitan and intercity QKD network, with an attack free fashion from arbitrary detector side channels.

  14. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  15. Practical realisation and elimination of an ECC-related software bug attack

    E-Print Network [OSTI]

    in modern e-business work-flows, are as follows: 1. Nguyen [28] described an attack on GPG version 1

  16. Breaking into a computer : attack techniques and tools used by cyber-criminals

    SciTech Connect (OSTI)

    None

    2010-06-24T23:59:59.000Z

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  17. Detecting Internet Worms at Early Stage Shigang Chen Sanjay Ranka

    E-Print Network [OSTI]

    Chen, Shigang

    proposes an Internet-worm early warning system that automatically detects concerted scan activities on the responsiveness of this early warning system. Keywords: Enterprise Security Management, Internet Worm, Early and derives possible signatures of worm attacks. Its goal is to issue warning at the early stage of worm

  18. Rapid and Efficient Detection of Distributed Anomalous Aggregates

    E-Print Network [OSTI]

    Wetherall, David

    be halted and require administrative action, e.g., consider the consequences of a DDoS attack launched via case of normal behavior. In this paper, we study the problem of rapid and efficient detection quickly and with orders of magnitude lower communication overhead than periodic queries in the common case

  19. Tight bound on the coherent-state quantum key distribution with heterodyne detection

    SciTech Connect (OSTI)

    Lodewyck, Jerome [Thales Research and Technologies, RD 128, 91767 Palaiseau Cedex (France); Laboratoire Charles Fabry de l'Institut d'Optique, CNRS, UMR 8501, Campus Universitaire, Batiment 503, 91403 Orsay Cedex (France); Grangier, Philippe [Laboratoire Charles Fabry de l'Institut d'Optique, CNRS, UMR 8501, Campus Universitaire, Batiment 503, 91403 Orsay Cedex (France)

    2007-08-15T23:59:59.000Z

    We propose an upper bound for the eavesdropper's information in the direct and reverse reconciliated coherent states quantum key distribution protocols with heterodyne detection. This bound is derived by maximizing the leaked information over the symplectic group of transformations that spans every physical Gaussian attack on individual pulses. We exhibit four different attacks that reach this bound, which shows that this bound is tight. Finally, we compare the secret key rate obtained with this bound to the homodyne rate.

  20. ASTROMLSKIT: A New Statistical Machine Learning Toolkit: A Platform for Data Analytics in Astronomy

    E-Print Network [OSTI]

    Saha, Snehanshu; R, Manikandan; Bora, Kakoli; Routh, Swati; Narasimhamurthy, Anand

    2015-01-01T23:59:59.000Z

    Astroinformatics is a new impact area in the world of astronomy, occasionally called the final frontier, where several astrophysicists, statisticians and computer scientists work together to tackle various data intensive astronomical problems. Exponential growth in the data volume and increased complexity of the data augments difficult questions to the existing challenges. Classical problems in Astronomy are compounded by accumulation of astronomical volume of complex data, rendering the task of classification and interpretation incredibly laborious. The presence of noise in the data makes analysis and interpretation even more arduous. Machine learning algorithms and data analytic techniques provide the right platform for the challenges posed by these problems. A diverse range of open problem like star-galaxy separation, detection and classification of exoplanets, classification of supernovae is discussed. The focus of the paper is the applicability and efficacy of various machine learning algorithms like K N...

  1. Social Turing Tests: Crowdsourcing Sybil Detection

    E-Print Network [OSTI]

    Wang, Gang; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y

    2012-01-01T23:59:59.000Z

    As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils that effectively befriend legitimate users, rendering existing automated Sybil detection techniques ineffective. In this paper, we explore the feasibility of a crowdsourced Sybil detection system for OSNs. We conduct a large user study on the ability of humans to detect today's Sybil accounts, using a large corpus of ground-truth Sybil accounts from the Facebook and Renren networks. We analyze detection accuracy by both "experts" and "turkers" under a variety of conditions, and find that while turkers vary significantly in their effectiveness, experts consistently produce near-optimal results. These results drive the design of our multi-tier crowdsourcing Sybil detection system. We use trace-driven simulations to show that it is both effective and scalable.

  2. Finite key analysis for symmetric attacks in quantum key distribution

    SciTech Connect (OSTI)

    Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2006-10-15T23:59:59.000Z

    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.

  3. Modeling of Damage in Cement-Based Materials Subjected to External Sulfate Attack. I: Formulation

    E-Print Network [OSTI]

    Mobasher, Barzin

    Modeling of Damage in Cement-Based Materials Subjected to External Sulfate Attack. I: Formulation subject headings: Damage; Models; Sulfates; Cements. Introduction A majority of the durability issues. Portland cement-based materials subjected to attack from external sulfates may suffer from two types of dam

  4. Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks

    E-Print Network [OSTI]

    Bullo, Francesco

    Cyber-Physical Security via Geometric Control: Distributed Monitoring and Malicious Attacks Fabio and extends our results on the security of cyber-physical systems based on geometric control theory: (i) we, and by various industrial security incidents [6], cyber-physical systems are prone to failures and attacks

  5. Cyber-Physical Systems under Attack Models, Fundamental limitations, and Monitor Design

    E-Print Network [OSTI]

    Hu, Fei

    , FL, Dec 11, 2011 F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security are cyber-physical systems: power generation and distribution networks water networks and mass-efficient buildings (heat transfer) F. Pasqualetti, F. D¨orfler, F. Bullo Cyber-Physical Systems Under Attack Security

  6. RISK MANAGEMENT AND RISK ANALYSIS-BASED DECISION TOOLS FOR ATTACKS ON

    E-Print Network [OSTI]

    Wang, Hai

    RISK MANAGEMENT AND RISK ANALYSIS- BASED DECISION TOOLS FOR ATTACKS ON ELECTRIC POWER Simonoff, J.usc.edu/create Report #04-004DRAFT #12;Risk Management and Risk Analysis-Based Decision Tools for Attacks on Electric for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles

  7. ElectroMagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack of a

    E-Print Network [OSTI]

    Boyer, Edmond

    ElectroMagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack, a "root of trust" must be defined, insulated and then carefully protected. Until very recently, this role agencies) have tackled the issue of protecting ASICs from side-channel attacks (SCAs). In the meantime

  8. On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong

    E-Print Network [OSTI]

    Youssef, Amr M.

    On the Interpolation Attacks on Block Ciphers A.M. Youssef and G. Gong Center for Applied attack, nite elds, Ga- lois Field Fourier Transform 1 Introduction Gong and Golomb 7 introduced a new the later by decimation d. Gong and Golomb showed that the distance of DES S-boxes approximated

  9. Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial

    E-Print Network [OSTI]

    Wang, Hai

    Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P Security has determined that external weapon threats due to surface-air missiles, as well as some

  10. Phase-remapping attack in practical quantum-key-distribution systems

    SciTech Connect (OSTI)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong [Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario (Canada); Tamaki, Kiyoshi [NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama 332-0012 (Japan)

    2007-03-15T23:59:59.000Z

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  11. A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL

    E-Print Network [OSTI]

    A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL Gregory V. Bard.bard@ieee.org Keywords: Blockwise Adaptive, Chosen Plaintext Attack (CPA), Secure Sockets Layer (SSL), Transport Layer). Abstract: This paper introduces a chosen-plaintext vulnerability in the Secure Sockets Layer (SSL

  12. Attacks on Singelee and Preneel's protocol Jorge Munilla and Alberto Peinado

    E-Print Network [OSTI]

    establishment protocol in wireless personal area networks. Nevertheless, in this paper we show effective relay- tion) systems, most of them are still vulnerable to relay attacks. This attack is conceptually depicted. Then both rogue parties readily forward each other all the messages. The electronic protection is thus

  13. Islamists claim deadly attack on UN building in Nigeria 26 August 2011

    E-Print Network [OSTI]

    in a decade. A radical Muslim sect blamed for a series of attacks in the country claimed responsibility the targeting of the U.N. at an open meeting on U.N. peacekeeping. U.S. President Barack Obama called the attack on which the U.N. was founded _ dignity, freedom, security, and peace," Obama said in a statement. "An

  14. Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770-2 Key Establishment Protocol Zhaohui Cheng and Richard Comley September) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770-2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770-2 [7] is vulnerable to a replay attack and also

  15. Attacks On An ISO/IEC 117702 Key Establishment Protocol Zhaohui Cheng # and Richard Comley

    E-Print Network [OSTI]

    Attacks On An ISO/IEC 11770­2 Key Establishment Protocol Zhaohui Cheng # and Richard Comley) on a key establishment protocol (mechanism 12) standardised in ISO/IEC 11770­2 are described and two standardised as key establishment mechanism 12 in ISO/IEC 11770­2 [7] is vulnerable to a replay attack and also

  16. Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3

    E-Print Network [OSTI]

    Jagannatham, Aditya K.

    #12;Contents Brain and Heart 1. Reducing your risk of stroke and heart attack. . . . 3 2. Exercising for a healthy heart . . . . . . . . . . . . . . . . 4 3. Choosing a home blood pressure unit . . . . . . . . . . . . . . . . . 47 #12;BRAIN AND HEART Reducing your risk of stroke and heart attack One of the best ways to protect

  17. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  18. Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1

    E-Print Network [OSTI]

    Krings, Axel W.

    : Security, Vulnerabilities, Cyber Attack, Critical Infrastructure Protection, Electric Power Management present a model developed for Electric Power Management Systems (EPMS) and Supervisory Control and Data vulnerable to cyber attack. We use graph theory to model electric power control and protection devices

  19. A Generalization of the Rainbow Band Separation Attack and its Applications to

    E-Print Network [OSTI]

    Recovery Attack, Rainbow, Enhanced STS, Enhanced TTS, MFE, Diophantine Equations, MQQ-Enc, MQQ-Sig 1-trivial generaliza- tion of the well known Unbalanced Oil and Vinegar (UOV) signature scheme (Eurocrypt '99) minimizing the length of the signatures. By now the Rainbow Band Separation attack is the best key recovery

  20. On the Impact of LowRate Attacks + MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

    E-Print Network [OSTI]

    of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks present an ongoing threat to almost TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds burst. Our analysis is focused towards worst­case scenarios, thus our results should be regarded

  1. On the Impact of Low-Rate Attacks MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

    E-Print Network [OSTI]

    Bestavros, Azer

    S) attacks and Distributed Denial of Service (DDoS) attacks present an ongoing threat to almost ev- ery TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded

  2. On the Impact of Low-Rate Attacks MINA GUIRGUIS AZER BESTAVROS IBRAHIM MATTA

    E-Print Network [OSTI]

    of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks present an ongoing threat to almost TCP flows by flooding an Internet link. In this paper, we study the impact of these new breeds burst. Our analysis is focused towards worst-case scenarios, thus our results should be regarded

  3. Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

    E-Print Network [OSTI]

    Kasera, Sneha Kumar

    Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park-- We propose to secure ad hoc networks against data injection attacks by placing firewall functionality] simulations. Our results show that our algorithm can find near-optimal solutions. Based on a simple analysis

  4. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 835 Cyber Attack Exposure Evaluation Framework for

    E-Print Network [OSTI]

    Manimaran, Govindarasu

    . The coupling of the power infrastructure with complex computer networks substantially expand current cyber, that is, threats, vulnerabilities, and attack consequences for current and emerging power grid systems. The substantial attack surface presented by the advanced metering infrastructure (AMI) along

  5. December 17th marked a special graduation celebration for the second Supervisory Management "Toolkit" (SMT) Program cohort. Fifteen participants from the program, along with some of their supervisors, attended

    E-Print Network [OSTI]

    Myers, Lawrence C.

    "Toolkit" (SMT) Program cohort. Fifteen participants from the program, along with some of their supervisors, Senior Trainer and program director, handed out graduation certificates to the participants. The SMT congratulates participants upon their completion of the SMT program. "Dartmouth College Today" 2005 SMT

  6. Koon Leai Larry Tan and Kenneth J. Turner. Orchestrating Grid Services using BPEL and Globus Toolkit 4. In Madjid Merabti, Rubem Pereira, Carol Oliver and OmarAbuelma'atti, editors, Proc. 7th PGNet Symposium, pages 31-36,

    E-Print Network [OSTI]

    Turner, Ken

    , Kenneth J. Turner, University of Stirling Abstract--Grid services exploit an emerging distributed has been adapted for this purpose, using ActiveBPEL as the orchestration engine and Globus Toolkit 4 and ActiveBPEL. Manuscript received May 2, 2006. K. L. L. Tan is with the University of Stirling, Stirling FK

  7. Application of Data Mining to Network Intrusion Detection: Classifier Selection Model

    E-Print Network [OSTI]

    Nguyen, Huy

    2010-01-01T23:59:59.000Z

    As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attention from the research community. The uncertainty to explore if certain algorithms perform better for certain attack classes constitutes the motivation for the reported herein. In this paper, we evaluate performance of a comprehensive set of classifier algorithms using KDD99 dataset. Based on evaluation results, best algorithms for each attack category is chosen and two classifier algorithm selection models are proposed. The simulation result comparison indicates that noticeable performance improvement and real-time intrusion detection can be achieved as we apply the proposed models to detect different kinds of network at...

  8. Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial for survival and

    E-Print Network [OSTI]

    Abstract Bird mortality is heavily affected by birds of prey. Under attack, take-off is crucial respond differently depending on the character of the predator's attack and these split-second decisions were studied using a model merlin (Falco columbarius) that attacked feeding blue tits (Parus caeruleus

  9. 4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack of Hydrogen

    E-Print Network [OSTI]

    Tullius, Thomas D.

    4698 Biochemistry 1993, 32, 4698-4701 Sequence-Specific Cleavage of DNA via Nucleophilic Attack by oxidative damage of the DNA backbone but instead is the result of nucleophilic attack by peroxide. A singleSaccharomyces cerevisae, whichactivatesthephosphodiester for attack by thediffusible smallnucleophile. While Flp

  10. Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer and Thomas Hellman Morton*

    E-Print Network [OSTI]

    Morton, Thomas Hellman

    Gas-Phase Electrophilic Attack of a Double Bond Exhibits Stereoselectivity Philip S. Mayer alkoxycarbenium ions in solution, which then attack allylsilanes (X ) CH2,Y ) CH3),3 followed by departure ethers via internal attack by oxygen.4 In other instances (cf. the Mukaiyama aldol condensation,5 where X

  11. New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    New side-channel attack against scan chains Jean Da Rolt, Giorgio Di Natale, Marie-Lise Flottes jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and shown the need for secure scan implementations. These attacks assume a single scan chain. However

  12. A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-for-Testability Structures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A Scan-based Attack on Elliptic Curve Cryptosystems in presence of Industrial Design-based attack on hardware implementations of Elliptic Curve Cryptosystems (ECC). Several up-to-date Design aspects of the proposed scan-based attack are described, namely timing and leakage analysis that allows

  13. A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs and Ingrid Verbauwhede1,2

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs Kris Tiri1 and Ingrid Verbauwhede1 VLSI design flow to create secure, side-channel attack (SCA) resistant integrated circuits. The design standard cell design flow. We discuss the basis for side-channel attack resistance and adjust the library

  14. Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree

    E-Print Network [OSTI]

    Teske, Edlyn

    Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields, we analyze the Gaudry-Hess-Smart (GHS) Weil descent attack on the elliptic curve discrete logarithm with these parameters; and (ii) the GHS attack is more eĂ?cient for solving the ECDLP in E(F 2 N ) than for solving

  15. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures

    E-Print Network [OSTI]

    Schaumont, Patrick

    , USA Abstract--Implementations of cryptographic primitives are vulnerable to physical attacks. While and up-to-date table of physical attacks and countermeasures is of paramount importance to system designers. This paper summarizes known physical attacks and counter- measures on Elliptic Curve

  16. On the Effectiveness of DDoS Attacks on Statistical Qiming Li Ee-Chien Chang Mun Choon Chan

    E-Print Network [OSTI]

    Chan, Mun Choon

    by the fiiter that guards the victim network. We study the effectiveness of DDoS attacks on such statistical study the effectiveness of DDoS attacks on statistical-based filtering in a general context whereOn the Effectiveness of DDoS Attacks on Statistical Filtering Qiming Li Ee-Chien Chang Mun Choon

  17. Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol

    SciTech Connect (OSTI)

    Tsurumaru, Toyohiro [Mitsubishi Electric Corporation, Information Technology R and D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa, 247-8501 (Japan)

    2007-06-15T23:59:59.000Z

    In this paper, we discuss the security of the differential-phase-shift quantum-key-distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. [Phys. Rev. A 73, 012344 (2006)]. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition of the single-photon states which she sends to the receiver. Concentrating especially on the 'discretized Gaussian' intensity modulation, we show that our attack is more effective than the individual attack, which had been the best attack up to present. As a result of this, the recent experiment with communication distance of 100 km reported by Diamanti et al. [Opt. Express 14, 13073 (2006)] turns out to be insecure. Moreover, it can be shown that in a practical experimental setup which is commonly used today, the communication distance achievable by the DPSQKD protocol is less than 95 km.

  18. Detecting Bots Based on Keylogging Activities

    E-Print Network [OSTI]

    Al-Hammadi, Yousof

    2010-01-01T23:59:59.000Z

    A bot is a piece of software that is usually installed on an infected machine without the user's knowledge. A bot is controlled remotely by the attacker under a Command and Control structure. Recent statistics show that bots represent one of the fastest growing threats to our network by performing malicious activities such as email spamming or keylogging. However, few bot detection techniques have been developed to date. In this paper, we investigate a behavioural algorithm to detect a single bot that uses keylogging activity. Our approach involves the use of function calls analysis for the detection of the bot with a keylogging component. Correlation of the frequency of a specified time-window is performed to enhance he detection scheme. We perform a range of experiments with the spybot. Our results show that there is a high correlation between some function calls executed by this bot which indicates abnormal activity in our system.

  19. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31T23:59:59.000Z

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  20. Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs

    E-Print Network [OSTI]

    Matta, Abraham "Ibrahim"

    #0205294, and EIA RI Award #0202067, and by grants from Fortress Technologies. attacks are orchestrated], [12], routing protocols [15], firewalls and traffic shapers [32], [14], HTTP and database server farms

  1. Security of the Quantum Key Distribution with Blind Polarization Bases against Impersonation Attack

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2006-02-24T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the impersonation attack.

  2. An immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol

    E-Print Network [OSTI]

    Osamu Hirota; Kaoru Kurosawa

    2006-04-06T23:59:59.000Z

    This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or $\\alpha\\eta$ scheme) against the fast correlation attack, the typical attack on stream ciphers. Although a very simple experimental model of the quantum stream cipher without a random mapper may be decrypted in the information theoretic sense by the fast correlation algorithm, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is dismissed also by quantum noise. In such a case, any fast correlation attack does not work on the quantum stream cipher.

  3. Security against the Invisible Photon Attack for the Quantum Key Distribution with Blind Polarization Bases

    E-Print Network [OSTI]

    Won-Ho Kye; M. S. Kim

    2005-08-03T23:59:59.000Z

    In this paper, we briefly show how the quantum key distribution with blind polarization bases [Kye et al., Phys. Rev. Lett. 95, 040501 (2005)] can be made secure against the invisible photon attack.

  4. DEFENDING AGAINST PHYSICAL DESTRUCTION ATTACKS ON WIRELESS SENSOR Chi Zhang, Yanchao Zhang, Yuguang Fang

    E-Print Network [OSTI]

    Zhang, Yanchao

    with stealth by moving across the ROI. Physical attacks are inevitable threats in WSNs: they are relatively, and should be an inseparable complementarity of the report about the observed events in the ROI. Secondly

  5. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  6. Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design

    E-Print Network [OSTI]

    Bullo, Francesco

    the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental]. The development of security This material is based in part upon work supported by NSF grants IIS- 0904501 and CPS

  7. Guilt by Association: United States Ties and Vulnerability to Transnational Terrorist Attacks

    E-Print Network [OSTI]

    Warhol, Matthew Grant

    2011-02-22T23:59:59.000Z

    Do nations' allies and trading partners affect their vulnerability to transnational terrorist attacks? Prior research has focused on how the attributes of individual nations, such as regime type, economic stability, and international power, affect...

  8. Not-a-Bot (NAB): Improving Service Availability in the Face of Botnet Attacks

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    A large fraction of email spam, distributed denial-of-service (DDoS) attacks, and click-fraud on web advertisements are caused by traffic sent from compromised machines that form botnets. This paper posits that by identifying ...

  9. A spillway infrastructure for defense against Distributed Denial of Service attacks

    E-Print Network [OSTI]

    Barkley, Andrew Holman

    2000-01-01T23:59:59.000Z

    to satisfy a balance of the following uncategorized guidelines: ~ Secure communication: the protocol is dilficult to be tricked by malicious mes- sages, and does not have any known flaws or vulnerabilities useful to a new type of attack. Weaknesses...

  10. Differential-phase-shift quantum key distribution with phase modulation to combat sequential attacks

    SciTech Connect (OSTI)

    Kawahara, Hiroki; Oka, Toru; Inoue, Kyo [Osaka University, Osaka 565-0871 (Japan)

    2011-11-15T23:59:59.000Z

    Phase-modulated differential-phase-shift (DPS) quantum key distribution (QKD) is presented for combating sequential attacks that most severely restrict the DPS-QKD system distance. Slow phase modulation imposed onto the DPS signal obstructs the optimum unambiguous state discrimination measurement conducted in the sequential attack and improves the QKD distance as a result. The condition with which the phase modulation does not degrade the DPS-QKD system performance is also described.

  11. Beamsplitting attack to the revised KKKP protocol and a possible solution

    E-Print Network [OSTI]

    Xiang-Bin Wang; Qiang Zhang; Yu-Ao Chen; Wong-Young Hwang; Myungshik Kim; Jian-Wei Pan

    2006-03-15T23:59:59.000Z

    We show that the revised KKKP protocol proposed by Kye and Kim [Phys. Rev. Lett. 95,040501(2005)] is still insecure with coherent states by a type of beamsplitting attack. We then further revise the KKKP protocol so that it is secure under such type of beamsplitting attack. The revised scheme can be used for not-so-weak coherent state quantum key distribution.

  12. Denial of Service attacks: path reconstruction for IP traceback using Adjusted Probabilistic Packet Marking

    E-Print Network [OSTI]

    Dube, Raghav

    2005-02-17T23:59:59.000Z

    DENIAL OF SERVICE ATTACKS: PATH RECONSTRUCTION FOR IP TRACEBACK USING ADJUSTED PROBABILISTIC PACKET MARKING A Thesis by RAGHAV DUBE Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... for the degree of MASTER OF SCIENCE December 2004 Major Subject: Electrical Engineering DENIAL OF SERVICE ATTACKS: PATH RECONSTRUCTION FOR IP TRACEBACK USING ADJUSTED PROBABILISTIC PACKET MARKING A Thesis by RAGHAV DUBE Submitted to Texas A&M University...

  13. Modeling experiments that simulate fragment attacks on cased munitions

    SciTech Connect (OSTI)

    Kerrisk, J.F.

    1996-01-01T23:59:59.000Z

    Roberts and Field (1993) have conducted experiments to observe the behavior of a cased high explosive (HE) charge subject to fragment attack at impact velocities below those needed for shock initiation. Two and three-dimensional hydrodynamic calculations have been done to model these experiments. Questions about the degree of confinement of the HE and about the condition of the HE during the impact were addressed. The calculations indicate that the HE was not strongly confined in this experiment, primarily due to the lateral expansion of polycarbonate blocks on the sides of the target during the impact. HE was not ejected from the hole in the casing made by the projectile up to 30 {micro}s after the impact. There are hints from these calculations of how initiation of a homogeneous sample of HE might occur in the experiment. The first involves the reshock of a small amount of HE at {approximately} 20 {micro}s as a result of the impact of the sabot on the target. The second involves the heating of the HE from plastic work during the impact. The maximum temperature rise of the HE (exclusive of the small region that was reshocked) was {approximately} 80 k. However, this is the average temperature of a region the size of a computational cell, and phenomena such as shear bands or cracks could result in higher temperatures on a smaller scale than the cell size. The third involves heating of the HE from contact with the casing material. The maximum temperature rise of the casing material from plastic work is {approximately} 870 k. This temperature occurs at the edge of a plug of casing material sheared off by the projectile. Other parts of the casing are shock heated to higher energies but may not contact the HE.

  14. Efficiency of attack strategies on complex model and real-world networks

    E-Print Network [OSTI]

    Bellingeri, Michele; Vincenzi, Simone

    2013-01-01T23:59:59.000Z

    We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Nodes were removed sequentially according to the importance criterion defined by the attack strategy. We used the size of the largest connected component (LCC) as a measure of network damage. We found that the efficiency of attack strategies (fraction of nodes to be deleted for a given reduction of LCC size) depends on the topology of the network, although attacks based on the number of connections of a node and betweenness centrality were often the most efficient strategies. Sequential deletion of nodes in decreasin...

  15. Alternative Fuel Implementation Toolkit

    E-Print Network [OSTI]

    ? Alternative Fuels, the Smart Choice: Alternative fuels ­ biodiesel, electricity, ethanol (E85), natural gas

  16. Solar Site Survey Toolkit

    Broader source: Energy.gov [DOE]

    After a couple outings, a principal technologist at Sandia National Laboratories saw a need for a travel kit that would have the necessary tools to make the task of site surveys more manageable and safer. They have had great success using the kit in the field already.

  17. ppt-toolkit.com

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( (ASpend by State -

  18. Commercial Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would like submit the following commentsCurrent-Promotions Sign

  19. Residential Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical squestionnairesquestionnaires

  20. Agricultural Marketing Toolkit

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973

  1. BioenergizeME Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform isEnergyMeeting | Department of EnergyConversion,/21/2015

  2. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  3. 898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 3, MARCH 2012 Most Active Band (MAB) Attack and Countermeasures in a

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    ) Attack and Countermeasures in a Cognitive Radio Network Nansai Hu, Student Member, IEEE, Yu-Dong Yao, Fellow, IEEE, and Joseph Mitola, Fellow, IEEE Abstract--This paper investigates a type of attacks on a cognitive radio (CR) network, most active band (MAB) attack, where an attacker or a malicious CR node senses

  4. 31/08/2010 13:44A misguided attack on kin selection Why Evolution Is True Page 1 of 15http://whyevolutionistrue.wordpress.com/2010/08/30/a-misguided-attack-on-kin-selection/

    E-Print Network [OSTI]

    Gardner, Andy

    31/08/2010 13:44A misguided attack on kin selection « Why Evolution Is True Page 1 of 15http://whyevolutionistrue.wordpress.com/2010/08/30/a-misguided-attack-on-kin-selection/ « I swear I was Egyptian! Relevant readings » A misguided attack on kin selection I don't know what's gotten into E. O. Wilson. He's certainly the world

  5. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Fei Gao; Su-Juan Qin; Fen-Zhuo Guo; Qiao-Yan Wen

    2011-04-20T23:59:59.000Z

    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.

  6. Wireless Security Techniques for Coordinated Manufacturing and On-line Hardware Trojan Detection

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    Wireless Security Techniques for Coordinated Manufacturing and On-line Hardware Trojan Detection) attacks that impose severe threats to the security and integrity of wireless networks and systems. We activi- ties, consumes ultra-low leakage power, and hides from delay characterizations. Therefore, the HT

  7. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems

    E-Print Network [OSTI]

    Chen, Ing-Ray

    within radio range Na b (t) Attacker strength detected at time t in Beta(, ) in Beta(, ) Number of ranging operations per node per TIDS Et Energy for transmission per node Er Energy for reception per node Ea Energy for analyzing data per node Es Energy for sensing per node Eo Initial system energy TIDS

  8. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  9. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  10. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08T23:59:59.000Z

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  11. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  12. Attack of fragmented-core debris on concrete in the presence of water. [PWR; BWR

    SciTech Connect (OSTI)

    Tarbell, W.W.; Bradley, D.R.

    1982-01-01T23:59:59.000Z

    In the unlikely event that core debris escapes the reactor pressure vessel, the interactions of the debris with concrete, structural materials, and coolant become the driving force for severe accident phenomena. The Ex-Vessel Core Debris Interactions Program at Sandia National Laboratories is an experimental research effort to characterize these interactions and the magnitude of safety-related phenomena such as flammable gas generation, aerosol production, fission product release, and concrete attack. Major areas of study within the program include molten core simultants in contact with concrete, high pressure melt streaming into scaled reactor cavities, the addition of coolant to high-temperature melt/concrete interactions, and the attack of hot, solid core debris on concrete. This paper describes results from the last of these efforts, i.e., hot, but not molten debris attacking concrete.

  13. Deterministic quantum-public-key encryption: forward search attack and randomization

    E-Print Network [OSTI]

    Georgios M. Nikolopoulos; Lawrence M. Ioannou

    2009-03-27T23:59:59.000Z

    In the classical setting, public-key encryption requires randomness in order to be secure against a forward search attack, whereby an adversary compares the encryption of a guess of the secret message with that of the actual secret message. We show that this is also true in the information-theoretic setting -- where the public keys are quantum systems -- by defining and giving an example of a forward search attack for any deterministic quantum-public-key bit-encryption scheme. However, unlike in the classical setting, we show that any such deterministic scheme can be used as a black box to build a randomized bit-encryption scheme that is no longer susceptible to this attack.

  14. Predicting the effect of climate change on wildfire behavior and initial attack success

    SciTech Connect (OSTI)

    Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

    2007-12-01T23:59:59.000Z

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

  15. WeaselBoard : zero-day exploit detection for programmable logic controllers.

    SciTech Connect (OSTI)

    Mulder, John C.; Schwartz, Moses Daniel; Berg, Michael J.; Van Houten, Jonathan Roger; Urrea, Jorge Mario; King, Michael Aaron; Clements, Abraham Anthony; Jacob, Joshua A.

    2013-10-01T23:59:59.000Z

    Critical infrastructures, such as electrical power plants and oil refineries, rely on programmable logic controllers (PLCs) to control essential processes. State of the art security cannot detect attacks on PLCs at the hardware or firmware level. This renders critical infrastructure control systems vulnerable to costly and dangerous attacks. WeaselBoard is a PLC backplane analysis system that connects directly to the PLC backplane to capture backplane communications between modules. WeaselBoard forwards inter-module traffic to an external analysis system that detects changes to process control settings, sensor values, module configuration information, firmware updates, and process control program (logic) updates. WeaselBoard provides zero-day exploit detection for PLCs by detecting changes in the PLC and the process. This approach to PLC monitoring is protected under U.S. Patent Application 13/947,887.

  16. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31T23:59:59.000Z

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  17. Fingerprint detection

    DOE Patents [OSTI]

    Saunders, George C. (Rt. 1, Box 428B, Espanola, NM 87532)

    1992-01-01T23:59:59.000Z

    A method for detection and visualization of latent fingerprints is provided and includes contacting a substrate containing a latent print thereon with a colloidal metal composition for time sufficient to allow reaction of said colloidal metal composition with said latent print, and preserving or recording the observable print. Further, the method for detection and visualization of latent fingerprints can include contacting the metal composition-latent print reaction product with a secondary metal-containing solution for time sufficient to allow precipitation of said secondary metal thereby enhancing the visibility of the latent print, and preserving or recording the observable print.

  18. Abstract--Network security against possible attacks involves making decisions under uncertainty. Not only may one be

    E-Print Network [OSTI]

    ], security in wireless networks [12], [13] and cyber-security [14], [15], [16]. In [17] the readers can find1 Abstract--Network security against possible attacks involves making decisions under uncertainty for a further DDoS (Distributed Denial of Service) botnet attack on servers). Due to limited defense

  19. An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States

    E-Print Network [OSTI]

    Wang, Hai

    An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States #12;An Analysis of the Risks of a Terrorist Attack on LNG Receiving Facilities in the United States 3-D Aerial View from Proposed SES LNG Receiving Facility Site to Downtown Long Beach [White line is 2

  20. Low-Power Side-Channel Attack-Resistant Asynchronous S-Box Design for AES Cryptosystems

    E-Print Network [OSTI]

    Ayers, Joseph

    function with an invertible affine transformation in order to avoid attacks based on mathematics. A block combinational S-Box (substitution box) design for AES (Advanced Encryption Standard) cryptosystems is proposed less in- formation against side-channel attacks such as differential power/noise analysis. Functional