Enterprise Security Monitoring with the Fusion Center Model

Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

In the past few years, we have witnessed cyber-attacks of unprecedented sophistication and reach. These attacks demonstrate that malicious actors have the ability to compromise and control millions of computers that belong to governments, enterprises, and ordinary citizens. If we are to prevent motivated adversaries from attacking our systems, stealing our data, and harming our critical infrastructure, we have to first understand emerging threats to develop proactive security solutions to safeguard the information and the physical infrastructure that rely on it. This chapter discusses one possible approach to defending against malicious actors at the enterprise level.

The past few years have witnessed the threats caused by the evolving of botnets. It has been found that the nefarious network consisting of contagious systems called as bots are operated by the botmaster. These botnets have been used for malicious activities. This prevailing threat on the internet has led to spam, Distributed Denial of Service (DDoS) attacks, phishing emails, and other cyber-attacks. The detection of such networks is very important keeping the protocols and features they work upon. The paper talks about the various detection techniques that can be adapted to evade the attacks of bots. The huge amount of traffic created by bots can be studied and distinguished respectively to understand the protocols used by the botmaster; which are further used to detect botnets based on the signature and anomaly patterns. The attacks being done from different locations have made it difficult for a botnet to be caught. It has been mentioned that a few networks provide the bots with a nickname using which the detection can be done. The method has been described thoroughly by also specifying how the bot-names of the same network are similar. Nowadays, the number of botnets has increased with a fewer number of trained bots. These network work upon the protocols like Command and Control (C&C), Internet Relay Chat (IRC), HyperText Transfer Protocol (HTTP) and Peer to Peer(P2P). The detection of such networks is being done classifying the traffic and analyzing the spam e-mails alongside the respected IP address. Even the traps of honeynet are developed which motivate the botmaster to take action and get caught. Such honeynet techniques along with the required steps and the necessary precautions are also mentioned in the paper.


2018 ◽  
Author(s):  
Gaolei Zhan ◽  
Younes Makoudi ◽  
Judicael Jeannoutot ◽  
Simon Lamare ◽  
Michel Féron ◽  
...  

Over the past decade, on-surface fabrication of organic nanostructures has been widely investigated for the development of molecular electronic devices, nanomachines, and new materials. Here, we introduce a new strategy to obtain alkyl oligomers in a controlled manner using on-surface radical oligomerisations that are triggered by the electrons/holes between the sample surface and the tip of a scanning tunnelling microscope. The resulting radical-mediated mechanism is substantiated by a detailed theoretical study. This electron transfer event only occurs when <i>V</i><sub>s</sub> < -3 V or <i>V</i><sub>s</sub> > + 3 V and allows access to reactive radical species under exceptionally mild conditions. This transfer can effectively ‘switch on’ a sequence leading to formation of oligomers of defined size distribution due to the on-surface confinement of reactive species. Our approach enables new ways to initiate and control radical oligomerisations with tunnelling electrons, leading to molecularly precise nanofabrication.


Author(s):  
Richard J. Simonson ◽  
Joseph R. Keebler ◽  
Mathew Lessmiller ◽  
Tyson Richards ◽  
John C. Lee

As cyber-attacks and their subsequent responses have become more frequent and complex over the past decade, research into the performance and effectiveness of cybersecurity teams has gained an immense amount of traction. However, investigation of teamwork in this domain is lacking due to the exclusion of known team competencies and a lack of reliance on team science. This paper serves to provide insight into the benefit that can be gained from utilizing the extant teamwork literature to improve teams’ research and applications in the domain of cyber-security.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Kwang-il Kim ◽  
Eunjeong Ji ◽  
Jung-yeon Choi ◽  
Sun-wook Kim ◽  
Soyeon Ahn ◽  
...  

AbstractWe analyzed the Korean National Health and Nutrition Examination Survey (KNHANES) database to determine the trends of hypertension treatment and control rate in Korea over the past 10 years. In addition, we tried to investigate the effect of chronic medical conditions on hypertension management. We investigated the hypertension prevalence, awareness, treatment, and control rate from 2008 to 2017. KNHANES, which uses a stratified multistage sampling design, is a cross-sectional, nationally representative survey conducted by the Korean government. A total of 59,282 adults (≥ 20 years) were included, which was representative of the total population of around 40 million Koreans per year. The mean age was 50.7 ± 16.4 years and 42.6% were male. The prevalence of hypertension, hypercholesterolemia, diabetes mellitus, and obesity significantly increased over the 10 years. During this period, the hypertension treatment and control rate significantly improved. Hypertension treatment rate was significantly lower in the younger age group compared to the older age group, but the control rate among the treated patients was not significantly different between age groups. The treatment and control rates of hypertension were higher in patients with multimorbidity, which implies that it has a favorable effect on the treatment and control of hypertension. Hypertension treatment and control rate have improved over the past 10 years. The higher treatment and control rate in patients with multimorbidity suggest that the more aggressive surveillance might be associated with the improvement of hypertension treatment and control rate in Korea.


2021 ◽  
pp. 1-14
Author(s):  
Mathew Alexander ◽  
Lynn Unruh ◽  
Andriy Koval ◽  
William Belanger

Abstract As of November 2020, the United States leads the world in confirmed coronavirus disease 2019 (COVID-19) cases and deaths. Over the past 10 months, the United States has experienced three peaks in new cases, with the most recent spike in November setting new records. Inaction and the lack of a scientifically informed, unified response have contributed to the sustained spread of COVID-19 in the United States. This paper describes major events and findings from the domestic response to COVID-19 from January to November 2020, including on preventing transmission, COVID-19 testing and contact tracing, ensuring sufficient physical infrastructure and healthcare workforce, paying for services, and governance. We further reflect on the public health response to-date and analyse the link between key policy decisions (e.g. closing, reopening) and COVID-19 cases in three states that are representative of the broader regions that have experienced spikes in cases. Finally, as we approach the winter months and undergo a change in national leadership, we highlight some considerations for the ongoing COVID-19 response and the broader United States healthcare system. These findings describe why the United States has failed to contain COVID-19 effectively to-date and can serve as a reference in the continued response to COVID-19 and future pandemics.


Algorithms ◽  
2021 ◽  
Vol 14 (6) ◽  
pp. 174
Author(s):  
Wenxiao Zhao

The stochastic approximation algorithm (SAA), starting from the pioneer work by Robbins and Monro in 1950s, has been successfully applied in systems and control, statistics, machine learning, and so forth. In this paper, we will review the development of SAA in China, to be specific, the stochastic approximation algorithm with expanding truncations (SAAWET) developed by Han-Fu Chen and his colleagues during the past 35 years. We first review the historical development for the centralized algorithm including the probabilistic method (PM) and the ordinary differential equation (ODE) method for SAA and the trajectory-subsequence method for SAAWET. Then, we will give an application example of SAAWET to the recursive principal component analysis. We will also introduce the recent progress on SAAWET in a networked and distributed setting, named the distributed SAAWET (DSAAWET).


1969 ◽  
Vol 34 ◽  
pp. 368-384 ◽  
Author(s):  
Sebastian Payne

In recent discussions of the origins and process of animal domestication (Reed, 1961, Zeuner, 1963), both authors rely on two kinds of evidence: on the one hand, the present distributions and characteristics of the different breeds of whatever animal is being discussed, together with its feral and wild relatives, and, on the other hand, the past record, given by literary and pictorial sources and the bones from archaeological and geological sites. Increased recognition of the limitations of the past record, whether in the accuracy of the information it appears to give (as in the case of pictorial sources), or in the certainty of the deductions we are at present capable of drawing from it (this applies especially to the osteological record), has led these authors to argue mainly from the present situation, using the past record to confirm or amplify the existing picture.Arguing from the present, many hypotheses about the origins and process of domestication are available. The only test we have, when attempting to choose between these, lies in the direct evidence of the past record. The past record, it is freely admitted, is very fragmentary: the information provided by the present situation is more exact, ranges over a much wider field, and is more open to test and control. Nevertheless, the past record, however imperfect it is, is the only direct evidence we have about the process of domestication.


2014 ◽  
Vol 31 (5) ◽  
pp. 3-20 ◽  
Author(s):  
John Urry

Energy forms and their extensive scale are remarkably significant for the ways that societies are organized. This article shows the importance of how societies are ‘energized’ and especially the global growth of ‘fossil fuel societies’. Much social thought remains oblivious to the energy revolution realized over the past two to three centuries which set the ‘West’ onto a distinct trajectory. Energy is troubling for social thought because different energy systems with their ‘lock-ins’ are not subject to simple human intervention and control. Analyses are provided here of different fossil fuel societies, of coal and oil, with the latter enabling the liquid, mobilized 20th century. Consideration is paid to the possibilities of reducing fossil fuel dependence but it is shown how unlikely such a ‘powering down’ will be. The author demonstrates how energy is a massive problem for social theory and for 21st-century societies. Developing post-carbon theory and especially practice is far away but is especially urgent.


2014 ◽  
Vol 971-973 ◽  
pp. 1033-1036
Author(s):  
Hui Jun Wang ◽  
Zhi Qun Yong

In view of the shortcoming such as wiring difficulties, poor scalability, and big cable usage in present mine security monitoring system, this paper puts forward a kind of substation monitoring and control system based on ZIGBEE and CAN. With the core of core, The system collects various measurement data of sensors through the ZIGBEE wireless network, realizes the to collect, and then through the CAN bus to realize the transmission of control commands and data of the up and down machine, and monitor the production parameters and environmental parameters in the coal mine. Experiments show that the monitoring substation is of high real-time performance, good stability, strong expansibility, etc., and can meet the requirements of the coal mine development and mining.


Sign in / Sign up

Export Citation Format

Share Document