displaying 1000 best results Help
Search results for: node-targeted attacks
-
Optimizing primary and backup SDN controllers' placement resilient to node-targeted attacks
Publication -
On joint primary and backup controllers’ placement optimization against node-targeted attacks
Publication -
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublicationIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Publication -
Network Protection Against Node Attacks Based on Probabilistic Availability Measures
Publication -
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublicationIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Improving the Survivability of Carrier Networks to Large-Scale Disasters
PublicationThis chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Service-based Resilience for Embedded IoT Networks
PublicationEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublicationMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Comprehensive Review of Fluorescence Applications in Gynecology
PublicationSince the introduction of indocyanine green (ICG) as a fluorophore in near-infrared imaging, fluorescence visualization has become an essential tool in many fields of surgery. In the field of gynecology, recent new applications have been proposed and found their place in clinical practice. Different applications in gynecology were investigated, subcategorized, and overviewed concerning surgical applications and available dyes....
-
Traffic Remapping Attacks in Ad Hoc Networks
PublicationAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
The complexity of node blocking for dags
PublicationRozważamy następującą grę (pomiędzy dwoma graczami) kombinatoryczną o nazwie ''node blocking''. Dany jest graf skierowany. Każdy wierzchołek może być zajęty przez co najwyżej jeden token. Wyróżniamy dwa kolory tokenów, biały i czarny, każdy gracz może przemieszczać tylko własne tokeny. Gracze wykonują ruchy naprzemiennie. Ruch polega na wyborze dowolnego tokena własnego koloru i przesunięciu go na dowolnego niezajętego przez inny...
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublicationIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
ESPAR Antenna-Based WSN Node With DoA Estimation Capability
PublicationIn this paper, we present a low-cost energy-efficient electronically steerable parasitic array radiator (ESPAR) antenna-based wireless sensor network (WSN) node designed for IEEE 802.15.4 standard that is capable of performing direction of arrival (DoA) estimation in real-life outdoor environments. To this end, we propose the WSN node architecture, design and realization that utilizes NXP JN5168 radio frequency (RF) wireless transceiver...
-
Electrophysiological features in patients with sinus node dysfunction and vasovagal syncope
PublicationThe aim of the study was to identify electrophysiological criteria that can be used for identification of patients with sinus node dysfunction and concurrent vasovagal syncope.
-
Fluorescence Imaging Using Methylene Blue Sentinel Lymph Node Biopsy in Melanoma
PublicationIntroduction: Fluorescence imaging of sentinel node biopsy in melanoma is a novel method. Both indocyanine green (ICG) and methylene blue (MB) have fl uorescent properties. The aim of this study was to present, for the fi rst time in a clinical series of patients, the possible usage of MB as a fl uorescent dye for sentinel node biopsy during surgery for melanoma. Material and methods: Twenty patients with...
-
Voltammetric and biological studies of folate-targeted non-lamellar lipid mesophases
PublicationFolate-targeted lipid nanostructures are promising strategies for the development of biocompatible drug delivery systems. The objective of this study was to evaluate the efficacy of drug delivery to cancer cells by folate-targeted lipid mesophases, cubosomes (CUB) and hexosomes (HEX), loaded with doxorubicin (DOX). Three cancer-derived cell lines (KB, HeLa, T98G) exhibiting different expressional levels of folate receptor protein...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Methylene Blue Near-Infrared Fluorescence Imaging in Breast Cancer Sentinel Node Biopsy
PublicationIntroduction: Fluorescence-based navigation for breast cancer sentinel node biopsy is a novel method that uses indocyanine green as a fluorophore. However, methylene blue (MB) also has some fluorescent properties. This study is the first in a clinical series presenting the possible use of MB as a fluorescent dye for the identification of sentinel nodes in breast sentinel node biopsy. Material and methods: Forty-nine patients with...
-
Modeling of truss with cold-formed section and positive eccentricity in the node
PublicationThis work is dedicated to establishing the load carrying capacity of tensed and compressed truss’ nodes made of cold-formed open cross sections. The occurrence of bending in the truss’ nodes is the result of a specific production technology for system lattice girders assumed by the designer and the producer. The aim of this research is to present the methodology of conduct for creation of computational models that best depict the...
-
Reliable Anycast and Unicast Routing: Protection against Attacks
PublicationObecne sieci są przeważnie chronione przed awariami losowymi, a topologie sieci są w większości uznawane za regularne. Znane mechanizmy ochrony dotyczą typowo transmisji unicast (jeden-do-jednego). Jednakże w związku z obserwowaną konwergencją technologii/usług, inne odmiany transmisji (np. anycast - jeden-do-jednego-z-wielu) nabierają znaczenia. Co więcej, okazuje się, iż często awarie nie mają losowego charakteru, a topologie...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Mixed 4-node shell element with assumed strain and stress in 6-parameter theory
PublicationWe propose a mixed hybrid 4-node shell elements based on Hu-Washizu principle. Apart from displacements both strains and stress fields are treated as independent fields. The element is derived in the framework of a general nonlinear 6-field shell theory with drilling rotation which is dedicated to the analysis of multifold irregular shells with intersections. The novelty of the presented results stems from the fact that the measures...
-
Mixed 4-node shell element with assumed strain and stress in 6-parameter theory
PublicationWe propose a mixed hybrid 4-node shell elements based on Hu-Washizu principle. Apart from displacements both strains and stress fields are treated as independent fields. The element is derived in the framework of a general nonlinear 6-field shell theory with drilling rotation which is dedicated to the analysis of multifold irregular shells with intersections. The novelty of the presented results stems from the fact that the measures...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
A multithreaded CUDA and OpenMP based power‐aware programming framework for multi‐node GPU systems
PublicationIn the paper, we have proposed a framework that allows programming a parallel application for a multi-node system, with one or more GPUs per node, using an OpenMP+extended CUDA API. OpenMP is used for launching threads responsible for management of particular GPUs and extended CUDA calls allow to manage CUDA objects, data and launch kernels. The framework hides inter-node MPI communication from the programmer who can benefit from...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Resonant Conditions in a Node with an SVC Compensator
PublicationThe primary purpose of installing static shunt compensators in power grids is to improve the voltage conditions. Additional reactive power sources increase the system’s voltage stability and enable faster system recovery after a voltage failure. This paper presents the impact of an SVC device’s structure and settings on impedance change in the supply system, and hence on the frequencies at which resonance phenomena can develop.
-
Robust four-node elements based on Hu–Washizu principle for nonlinear analysis of Cosserat shells
PublicationMixed 4-node shell elements with the drilling rotation and Cosserat-type strain measures based onthe three-field Hu–Washizu principle are proposed. In the formulation, apart from displacement and rotationfields, both strain and stress resultant fields are treated as independent. The elements are derived in the frame-work of a general nonlinear 6-parameter shell theory dedicated to the analysis of multifold irregular shells.The...
-
Signal Transduction and Targeted Therapy
Journals -
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublicationThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
Molecularly targeted nanoparticles: an emerging tool for evaluation of expression of the receptor for advanced glycation end products in a murine model of peripheral artery disease
PublicationAbstract Background: Molecular imaging with molecularly targeted probes is a powerful tool for studying the spatio-temporal interactions between complex biological processes. The pivotal role of the receptor for advanced glycation end products (RAGE) in numerous pathological processes, aroused the demand for RAGE targeted imaging in various diseases. In the study, we evaluated the use of a diagnostic imaging agent for RAGE quantification...
-
Efficiency of service recovery in scale-free optical networks under multiple node failures
PublicationIn this paper we examine the properties of scale-free networks in case of simultaneous failures of two networknodes. Survivability assumptions are as follows: end-to-end path protection with two node-disjoint backup pathsfor each working path. We investigate three models of scale-free networks generation: IG, PFP and BA.Simulations were to measure the lengths of active and backup paths and the values of service recovery time.We...
-
Method of identification of the slide tribological system top layer condition by assessment of the t-02 four-ball tester friction node operation
Publicationa method is proposed of the assessment of t-02 four-ball tester friction node operation during extreme unit loads on the tribological system for identification of the top layer condition in that system lubricated with the tested lubricating oil. by identification of the friction node with a thermodynamic system, that operation is treated as an energy generating process of the created servo-layer structure. the friction node operation...
-
Architectural and Urban Planning Solutions for the Protection of Heritage Buildings in the Context of Terrorist Attacks: Following the Example of Passive Protection Systems
PublicationEvents in recent years showing numerous terrorist attacks raise awareness regarding the neces-sity of considering the safety of heritage buildings. The analysis of available data allows us to conclude that it is not possible to fully prevent terrorist attacks. On the other hand, it is possible to minimize the impact of such incidents through proper design of Passive Protection System (PPS) components. One possible architectural...
-
Service restoration in survivable networks under attacks
PublicationW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
Service restoration in survivable networks under malicious attacks
PublicationW artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Survivability of unicast and anycast flows under attacks on networks
PublicationW artykule zaproponowano nowy algorytm zwany RA zapewniania ochrony transmisji anycast przed atakami na sieci o topologii nieregularnej. Założono wykorzystanie pojedynczej ścieżki podstawowej chroniącej połączenie przed awarią pojedynczego węzła sieci. Serwery: podstawowy i zabezpieczający każdej transmisji anycast rozlokowano w odrębnych węzłach sieci. Zaproponowano: specjalną metrykę kosztu łączy służącą do wyznaczania ścieżek...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Report no: WOiO /II/46/2015 - Construction node verification test, estimation of breaking load (shear force) and destruction form
PublicationA new generation of tanks for LNG transportation has been designed. Mass reduction forced our customer to use three different materials: austenitic steel, aluminium alloy and LNG compressed wood between them. The expertise concerns structural node between tank foundation and suspension. Expertise contains: description of object of test, test principals, results and conclusions