scholarly journals Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network

Author(s):  
Yu Rao ◽  
Weixin Liu ◽  
Tian Zhu ◽  
Hanbin Yan ◽  
Hao Zhou ◽  
...  

AbstractIn recent years, a large number of users continuously suffer from DDoS attacks. DDoS attack volume is on the rise and the scale of botnets is also getting larger. Many security organizations began to use data-driven approaches to investigate gangs and groups beneath DDoS attack behaviors, trying to unveil the facts and intentions of DDoS gangs. In this paper, DDoSAGD - a DDoS Attack Group Discovery framework is proposed to help gang recognition and situation awareness. A heterogeneous graph is constructed from botnet control message and relative threat intelligence data, and a meta path-based similarity measurement is set up to calculate relevance between C2 servers. Then two graph mining measures are combined to build up our hierarchical attack group discovery workflow, which can output attack groups with both behavior-based similarity and evidence-based relevance. Finally, the experimental results demonstrate that the designed models are promising in terms of recognition of attack groups, and evolution process of different attack groups is also illustrated.

OTO Open ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 2473974X2110104
Author(s):  
Jia Hui Ng ◽  
Dan Daniel ◽  
Anton Sadovoy ◽  
Constance Ee Hoon Teo

Objectives There is a lack of evidence-based guidelines with regard to eye protection for aerosol-generating procedures in otolaryngology practice. In addition, some recommended personal protective equipment (PPE) is not compatible with commonly used ENT equipment. This study aims to investigate the degree of eye protection that commonly used PPE gives. Study Design Simulation model. Setting Simulation laboratory. Methods A custom-built setup was utilized to simulate the clinical scenario of a patient cough in proximity of a health care worker. A system that sprays a xanthan-fluorescein mixture was set up and calibrated to simulate a human cough. A mannequin with cellulose paper placed on its forehead, eyes, and mouth was fitted with various PPE combinations and exposed to the simulated cough. The degree of contamination on the cellulose papers was quantified with a fluorescent microscope able to detect aerosols ≥10 µm. Results When no eye protection was worn, 278 droplets/aerosols reached the eye area. The use of the surgical mask with an attached upward-facing shield alone resulted in only 2 droplets/aerosols reaching the eye area. In this experiment, safety glasses and goggles performed equally, as the addition of either brought the number of droplets/aerosols reaching the eye down to 0. Conclusion When used with an upward-facing face shield, there was no difference in the eye protection rendered by safety goggles or glasses in this study. Safety glasses may be considered a viable alternative to safety goggles in aerosol-generating procedures.


2019 ◽  
Vol 2 (4) ◽  
pp. 294
Author(s):  
Sarah Mansour

Creativity has been assigned to the design or drawing, with materials most often being specified as a result of design rather than being considered a driver of it. Designers empowered by new technology now consider form as it is defined by identifiable systems. This evidence based, parametric methodology is a response to two decades of digitally-derived projects, often produced simply for their novelty. The best work results when the architect has combined respect for the old with a skilled progressive command of the new. Material culture is portrayed as the physical confirmation and articulation of a culture in its relics and design. In the time that we comprehend the thought of material culture not just as having importance for investigations of the past. yet in addition getting a projective limit. we may now be at a critical defining moment.. As computation starts to significantly change our origination of the material, so in architecture this will defy the set up connection between the procedures of design and the physical fabrication of the constructed medium . Obviously, computation was brought into design & architecture the greater part a century back. furthermore, expanding digitization has since plagued all parts of the field . As though, it has remained emphatically impacted by the theoretical isolation of the procedures of design and making that has overwhelmed structural plan thinking since the Renaissance, and it is just now that creators are starting to deal with the computational void as never again disconnecting from the physical domain.


2021 ◽  
Author(s):  
Milou Sep ◽  
Marijn Vellinga ◽  
R. Angela Sarabdjitsingh ◽  
Marian Joëls

Environmental information plays an important role in remembering events. Information about stable aspects of the environment (here referred to as ‘context’) and the event are combined by the hippocampal system and stored as context-dependent memory. In rodents (such as rats and mice), context-dependent memory is often investigated with the object-in-context task. However, the implementation and interpretation of this task varies considerably across studies. This variation hampers the comparison between studies and - for those who design a new experiment or carry out pilot experiments – the estimation of whether observed behavior is within the expected range. Also, it is currently unclear which of the variables critically influence the outcome of the task. To address these issues, we carried out a preregistered systematic review (PROSPERO CRD42020191340) and provide an up-to-date overview of the animal-, task-, and protocol-related variations in the object-in-context task for rodents. Using a data-driven explorative meta-analysis we next identified critical factors influencing the outcome of this task, such as sex, testbox size and the delay between the learning trials. Based on these observations we provide recommendations to create more consensus in the set-up, procedure and interpretation of the object-in-context task for rodents. This could contribute to a more robust and evidence-based design in future animal experiments.


2010 ◽  
Vol 2010 ◽  
pp. 1-16 ◽  
Author(s):  
Piet L. J. M. Leroy ◽  
Daphne M. Schipper ◽  
Hans (J.) T. A. Knape

Objectives. To investigate which skills and competence are imperative to assure optimal effectiveness and safety of procedural sedation (PS) in children and to analyze the underlying levels of evidence.Study Design and methods. Systematic review of literature published between 1993 and March 2009. Selected papers were classified according to their methodological quality and summarized in evidence-based conclusions. Next, conclusions were used to formulate recommendations.Results. Although the safety profiles vary among PS drugs, the possibility of potentially serious adverse events and the predictability of depth and duration of sedation define the imperative skills and competence necessary for a timely recognition and appropriate management. The level of effectiveness is mainly determined by the ability to apply titratable PS, including deep sedation using short-acting anesthetics for invasive procedures and nitrous oxide for minor painful procedures, and the implementation of non-pharmacological techniques.Conclusions. PS related safety and effectiveness are determined by the circumstances and professional skills rather than by specific pharmacologic characteristics. Evidence based recommendations regarding necessary skills and competence should be used to set up training programs and to define which professionals can and cannot be credentialed for PS in children.


2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Tzung-Han Jeng ◽  
Yi-Ming Chen ◽  
Chien-Chih Chen ◽  
Chuan-Chiang Huang

Despite the efforts of information security experts, cybercrimes are still emerging at an alarming rate. Among the tools used by cybercriminals, malicious domains are indispensable and harm from the Internet has become a global problem. Malicious domains play an important role from SPAM and Cross-Site Scripting (XSS) threats to Botnet and Advanced Persistent Threat (APT) attacks at large scales. To ensure there is not a single point of failure or to prevent their detection and blocking, malware authors have employed domain generation algorithms (DGAs) and domain-flux techniques to generate a large number of domain names for malicious servers. As a result, malicious servers are difficult to detect and remove. Furthermore, the clues of cybercrime are stored in network traffic logs, but analyzing long-term big network traffic data is a challenge. To adapt the technology of cybercrimes and automatically detect unknown malicious threats, we previously proposed a system called MD-Miner. To improve its efficiency and accuracy, we propose the MD-MinerP here, which generates more features with identification capabilities in the feature extraction stage. Moreover, MD-MinerP adapts interaction profiling bipartite graphs instead of annotated bipartite graphs. The experimental results show that MD-MinerP has better area under curve (AUC) results and found new malicious domains that could not be recognized by other threat intelligence systems. The MD-MinerP exhibits both scalability and applicability, which has been experimentally validated on actual enterprise network traffic.


2018 ◽  
Vol 24 (1) ◽  
pp. 192-197
Author(s):  
Florian Rapan ◽  
Ioana Raluca Gologach

Abstract The disappearance of bipolarity causes essential mutations in the international security environment, which highlights the need to rethink the defence concept. The analysis of new risks and threats to international security has led to a new perception of it and has imposed a new orientation in the field of defence. The formation of new partnerships and alliances greatly reduces the likelihood of a conflict between members, which contributes to supporting the common interest of countries to maintain and strengthen international peace and security. All countries of the world are, in principle, members of at least one regional or intergovernmental organization. Although traditionally regional organizations have been set up on the basis of political, economical or environmental objectives, they have also entered security in recent decades and have started to develop their own capabilities to prevent conflicts and support peacekeeping operations or post-conflict construction of states


1938 ◽  
Vol 84 (353) ◽  
pp. 1068-1068
Author(s):  
Karin Stephen

This paper deals with the problem of neurotic anxiety, that is of anxiety which is not justified by external circumstances. Such anxiety is explained as a reaction to an internal danger situation created by emotional conflict in early life. An attempt is made to reconstruct the nature of this conflict in the light of evidence based on the psycho-analysis of patients suffering from anxiety symptoms, and the primitive defences called out by this danger are discussed. The conclusion drawn is that these defences, though temporarily successful, are in the long run ineffective, and actually set up a vicious circle which perpetuates the very danger it aims at averting.


2016 ◽  
Vol 32 (1) ◽  
Author(s):  
Jaap de Koning ◽  
Luuk Mallee ◽  
Paul de Hek ◽  
Maikel Groenewoud

Experimentation within the field of re-integration This article summarises the results of a recent study aimed at setting up and evaluating randomised experiments in the field of re-integration. Experiments are important, because they can produce reliable estimates of the effect of re-integration on job entry chances. The fact that in the Netherlands so far hardly any re-integration measure has been subjected to an experiment has contributed to the lack of insight in the effectiveness of re-integration policy. It proved to be difficult to find municipalities that are capable of and prepared to implement experiments. Nine such municipalities were found, but partly due to inexperience problems occurred during implementation. In the end six experiments were implemented in a sufficient way, and evaluated. Particularly the two experiments in Rotterdam show that experiments have an added value. These experiments were set up and carried out in such a way that they provide accurate estimates of the effectiveness of the measures involved. The results have been used for policy development in Rotterdam. Furthermore, both local politicians as well as the people involved in managing and implementing re-integration policy have recognised the importance of experiments and think positively of future experiments. However, for most municipalities this is not yet the case. The people politically responsible for re-integration policy and those involved in managing and implementing it have to become aware of the fact that policies have to be evidence-based and that experiments are a crucial tool in acquiring the evidence needed. In many cases people simply believe in the effectiveness of their policies, although the international evaluation literature indicates that this believe is far too optimistic. A further professionalization of the field is much needed. Finally, we make a number of practical recommendations for implementing and evaluating experiments.


2020 ◽  
Vol 60 (2) ◽  
pp. 150-158 ◽  
Author(s):  
Lykke Schrøder Jakobsen ◽  
Christina Jacobsen ◽  
Niels Lynnerup ◽  
Jacob Steinmetz ◽  
Jytte Banner

Internationally, clinical forensic medicine (CFM) is diverse in content and conduct, and forensic medical methods are not always evidence based. The first step towards evidence-based practice is to achieve a thorough knowledge of international diversity, which necessitates that CFM practitioners provide information about their national practice. This paper’s aim is to describe the organisation of CFM in Denmark, exemplified by the set-up in Eastern Denmark, and the types of assessments performed. In Denmark, forensic medicine is a board-certified specialty under the health authorities, with mandatory qualifications. The Danish Accreditation Fund accredits the Departments of Forensic Medicine as inspection bodies, according to an international European standard that is approved by Danish Standards. Mainly at police request, forensic doctors perform examinations of both victims and suspected perpetrators of perilous crimes. The examinations’ purposes are documentation and assessment of the findings and collection of biological evidence. The clinical forensic examinations do not include any treatment or medical follow-up. Thus, the forensic doctors must be neutral, objective and impartial. The clinical forensic examinations provide documentation of findings and conclusions not otherwise available for the police investigation and legal aftermath. Moreover, the accredited, standardised protocols ensure that the Departments of Forensic Medicine meet their obligations as inspection bodies, thus ensuring public confidence in the departments’ services.


Sign in / Sign up

Export Citation Format

Share Document