scholarly journals Characterizing the Impact of DDoS Attack on Inter-domain Routing System: A Case Study of the Dyn Cyberattack

Author(s):  
Yujing Liu ◽  
Zhilin Wang ◽  
Nan Li
2019 ◽  
Vol 10 (11) ◽  
pp. 1131-1135
Author(s):  
Tomas Hambili Paulo Sanjuluca ◽  
◽  
Ricardo Correia ◽  
Anabela Antunes de Almeida ◽  
Ana Gloria Diaz Martinez ◽  
...  

Introduction: In order to have a good assessment of the quality of maternal and child health care, it is essential that there is up-to-date and reliable information. Objective: To evaluate the impact of the implementation of a computerized database of clinical processes in the admission, archive and medical statistics section, of Maternity hospital Irene Neto/Lubango-Angola. Methodology: A descriptive study with a quantitative and qualitative approach to carry out a retrospective case study deliveries and newborns, records from 2014 to 2017. Final considerations: The implementation of this project may contribute to the improvement of clinical management support management of the hospital as well as facilitating access to information for research and scientific production.


2018 ◽  
Author(s):  
Emmanuel Owusu-Kwarteng ◽  
Prince Opoku ◽  
Gershon Dagba ◽  
Mark Amankwa

Author(s):  
Nazanin Pilevari ◽  
Mahyar Valeh Shiva

Background: The outbreak of the COVID-19 virus has had many destructive impacts on socio-economic and health systems. The health systems of countries could be supportive in crisis management, but they also are affected by the impact of the crisis, consequently, their operational level has declined. This study pursued resilience in an overall national health system under pandemic stress. Methods: Based on WHO building blocks, by interviewing informants of the Ministry of Health and Medical Education, in Tehran-Iran, early 2021 a rich picture of the current situation depicted, the resilience model was extracted via a mixed method of Soft System Methodology (SSM) and total interpretive structural modeling (TISM). Dynamic capabilities were applied for the orchestration of the Iranian health system. Results: Particular functional and structural suggestions applicable for designing a ubiquitous resilience model for the country-wide health system are presented in this study. The variables of crisis sensing, opportunity seizing, and reconfiguration are the cornerstones of health system resilience. Conclusion: Well-suited health technology assessment (HTA) and health information system (HIS) play significant roles in the overall strengthening of the health system. All reforms for resilience will have a lasting result when the capabilities created by the resilience model are learned and reused in a dynamic cycle.


Author(s):  
Mhafuzul Islam ◽  
Mashrur Chowdhury ◽  
Hongda Li ◽  
Hongxin Hu

A connected vehicle (CV) environment is comprised of diverse computing infrastructure, data communication and dissemination, and data collection systems that are vulnerable to the same cyberattacks as all traditional computing environments. Cyberattacks can jeopardize the expected safety, mobility, energy, and environmental benefits from CV applications. As cyberattacks can lead to severe consequences such as traffic incidents, it has become one of the primary concerns in CV applications. In this paper, we evaluate the impact of cyberattacks on the vehicle-to-infrastructure (V2I) network from a V2I application point of view. Then, we develop a novel V2I cybersecurity architecture, named CVGuard, which can detect and prevent cyberattacks on the V2I applications. In designing CVGuard, key challenges, such as scalability, resiliency and future usability were considered. A case study using a distributed denial of service (DDoS) attack on a V2I application, “Stop Sign Gap Assist (SSGA)” application, shows that CVGuard was effective in mitigating the adverse safety effects created by a DDoS attack. In our case study, because of the DDoS attack, conflicts between the minor and major road vehicles occurred at an unsignalized intersection, which could have caused crashes. A reduction of conflicts between vehicles occurred because CVGuard was in operation. The reduction of conflicts was compared based on the number of conflicts before and after the implementation and operation of the CVGuard security platform. Analysis revealed that the strategies adopted by CVGuard were successful in reducing the conflicts by 60% where a DDoS attack compromised the SSGA application at an unsignalized intersection.


2020 ◽  
Vol 44 (2) ◽  
pp. 297-316
Author(s):  
Michal Čerňanský ◽  
Ladislav Huraj ◽  
Marek Šimon

The paper focuses on design, background and experimental results of real environment of DDoS attacks. The experimental testbed is based on employment of a tool for IT automation to perform DDoS attacks under monitoring. DDoS attacks are still serious threat in both IPv4 and IPv6 networks and creation of simple tool to test the network for DDoS attack and to allow evaluation of vulnerabilities and DDoS countermeasures of the networks is necessary. In proposed testbed, Ansible orchestration tool is employed to perform and coordinate DDoS attacks. Ansible is a powerful tool and simplifies the implementation of the test environment. Moreover, no special hardware is required for the attacks execution, the testbed uses existing infrastructure in an organization. The case study of implementation of this environment shows straightforwardness to create a testbed comparable with a botnet with ten thousand bots. Furthermore, the experimental results demonstrate the potential of the proposed environment and present the impact of the attacks on particular target servers in IPv4 and IPv6 networks.


2004 ◽  
Vol 4 (4) ◽  
pp. 235-243 ◽  
Author(s):  
I. Fisher ◽  
G. Kastl ◽  
A. Sathasivan ◽  
P. Chen ◽  
J. van Leeuwen ◽  
...  

Water treatment processes produce water with low turbidity and colour. It is also now becoming necessary to reduce DOC (Dissolved Organic Carbon) so that less chlorine is lost in a distribution system and less THMs (trihalomethanes) are formed. Enhanced coagulation (exceeding other requirements) at pH of about 5-6 is known to significantly reduce DOC so that acceptable water quality can be achieved at the tap. In this paper, models are integrated to project the impact of water treatment on water quality through the entire distribution system. A DOC removal model, which predicts DOC resulting from a given coagulant, its dose and the coagulation pH, is used to simulate the treatment. By linking this model of DOC removal with models of chlorine decay and THM formation, the impact of treatment on chlorine and THM concentrations in a distribution system can be simulated. This method was applied in a case study with relatively high initial DOC. It was shown that more DOC can be removed by using ferric coagulant than the current practice achieves. This would result in an improved chlorine profile and a substantial reduction in THM concentrations.


Sign in / Sign up

Export Citation Format

Share Document