scholarly journals Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment

Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1849
Author(s):  
Gaurav Sharma ◽  
Stilianos Vidalis ◽  
Catherine Menon ◽  
Niharika Anand ◽  
Somesh Kumar

Threat assessment is the continuous process of monitoring the threats identified in the network of the real-time informational environment of an organisation and the business of the companies. The sagacity and security assurance for the system of an organisation and company’s business seem to need that information security exercise to unambiguously and effectively handle the threat agent’s attacks. How is this unambiguous and effective way in the present-day state of information security practice working? Given the prevalence of threats in the modern information environment, it is essential to guarantee the security of national information infrastructure. However, the existing models and methodology are not addressing the attributes of threats like motivation, opportunity, and capability (C, M, O), and the critical threat intelligence (CTI) feed to the threat agents during the penetration process is ineffective, due to which security assurance arises for an organisation and the business of companies. This paper proposes a semi-automatic information security model, which can deal with situational awareness data, strategies prevailing information security activities, and protocols monitoring specific types of the network next to the real-time information environment. This paper looks over analyses and implements the threat assessment of network traffic in one particular real-time informational environment. To achieve this, we determined various unique attributes of threat agents from the Packet Capture Application Programming Interface (PCAP files/DataStream) collected from the network between the years 2012 and 2019. We used hypothetical and real-world examples of a threat agent to evaluate the three different factors of threat agents, i.e., Motivation, Opportunity, and Capability (M, O, C). Based on this, we also designed and determined the threat profiles, critical threat intelligence (CTI), and complexity of threat agents that are not addressed or covered in the existing threat agent taxonomies models and methodologies.

Author(s):  
Hailin Xiao ◽  
Wenqian Zhang ◽  
Wanying Li ◽  
Anthony Theodore Chronopoulos ◽  
Zhongshan Zhang

1977 ◽  
Vol 16 (10) ◽  
pp. 1022-1028 ◽  
Author(s):  
H. W. Baynton ◽  
R. J. Serafin ◽  
C. L. Frush ◽  
G. R. Gray ◽  
P. V. Hobbs ◽  
...  

Abstract Color displays of the velocities of precipitation particles detected with a C-band Doppler radar in wide-spread cyclonic storms provide a variety of real-time information on the atmospheric wind field.Vertical profiles of wind speed and direction indicated by the real-time color displays agree well withrawinsonde measurements. Veering winds (or warm advection) produce a striking S-shaped pattern onthe color display and backing winds (or cold advection) produce a backward S. A maximum in the verticalprofile of wind speed is indicated by a pair of concentric colored rings, one upwind and one downwind ofthe radar. Vertically sloping velocity maxima are indicated by asymmetries in the color displays, as areconfluent and difluent winds. Divergence and convergence computed from the real-time color displays areof reasonable magnitude.


2013 ◽  
Vol 273 ◽  
pp. 641-645 ◽  
Author(s):  
Rong Chun Sun ◽  
Yan Piao ◽  
Yu Wang ◽  
Han Wang

To help drivers to quickly find a spare parking, a parking guidance control system was proposed. The principle of ultrasonic ranging was used to detect the state of a parking space, and through the internet of things the parking detector transmits the real-time information to the control center. The control center mainly is an industrial computer and is responsible for dealing with the real-time information and sending the control command by internet of things. The guidance signs at each crossroad receive the wireless commands and execute them, by which the guidance function is performed. The internet of things was realized by ZigBee star network, in which the control center is a coordinator and other parts are routers or terminal equipments. The simulation experiment results show that the parking guidance system works well, and has the value of application and promotion to some extent.


2021 ◽  
Vol 13 (19) ◽  
pp. 3998
Author(s):  
Jianhao Gao ◽  
Yang Yi ◽  
Tang Wei ◽  
Haoguan Zhang

Publicly available optical remote sensing images from platforms such as Sentinel-2 satellites contribute much to the Earth observation and research tasks. However, information loss caused by clouds largely decreases the availability of usable optical images so reconstructing the missing information is important. Existing reconstruction methods can hardly reflect the real-time information because they mainly make use of multitemporal optical images as reference. To capture the real-time information in the cloud removal process, Synthetic Aperture Radar (SAR) images can serve as the reference images due to the cloud penetrability of SAR imaging. Nevertheless, large datasets are necessary because existing SAR-based cloud removal methods depend on network training. In this paper, we integrate the merits of multitemporal optical images and SAR images to the cloud removal process, the results of which can reflect the ground information change, in a simple convolution neural network. Although the proposed method is based on deep neural network, it can directly operate on the target image without training datasets. We conduct several simulation and real data experiments of cloud removal in Sentinel-2 images with multitemporal Sentinel-1 SAR images and Sentinel-2 optical images. Experiment results show that the proposed method outperforms those state-of-the-art multitemporal-based methods and overcomes the constraint of datasets of those SAR-based methods.


2013 ◽  
Vol 385-386 ◽  
pp. 614-617
Author(s):  
Lan Xin Hu ◽  
Hai Bo Feng ◽  
Hai Meng Yin

This paper probes into the design of the remote wireless monitoring system for wind turbine, based on STC89C54RD+ microprocessor. TC35 produced by Siemens is used to send and receive information. Through this we can obtain the Real-time information of the temperature and vibration of the wind turbines.


Author(s):  
Youzhi Zhang ◽  
Qingyu Guo ◽  
Bo An ◽  
Long Tran-Thanh ◽  
Nicholas R. Jennings

Most violent crimes happen in urban and suburban cities. With emerging tracking techniques, law enforcement officers can have real-time location information of the escaping criminals and dynamically adjust the security resource allocation to interdict them. Unfortunately, existing work on urban network security games largely ignores such information. This paper addresses this omission. First, we show that ignoring the real-time information can cause an arbitrarily large loss of efficiency. To mitigate this loss, we propose a novel NEtwork purSuiT game (NEST) model that captures the interaction between an escaping adversary and a defender with multiple resources and real-time information available. Second, solving NEST is proven to be NP-hard. Third, after transforming the non-convex program of solving NEST to a linear program, we propose our incremental strategy generation algorithm, including: (i) novel pruning techniques in our best response oracle; and (ii) novel techniques for mapping strategies between subgames and adding multiple best response strategies at one iteration to solve extremely large problems. Finally, extensive experiments show the effectiveness of our approach, which scales up to realistic problem sizes with hundreds of nodes on networks including the real network of Manhattan.


Sign in / Sign up

Export Citation Format

Share Document