Academic literature on the topic 'UDP attacks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'UDP attacks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "UDP attacks"

1

Fatkieva, R. R., A. S. Sudakov, and A. S. Nersisyan. "Key Characteristics of Network Traffic to Identify DDoS Attacks." LETI Transactions on Electrical Engineering & Computer Science 17, no. 8 (2024): 65–80. http://dx.doi.org/10.32603/2071-8985-2024-17-8-65-80.

Full text
Abstract:
Modern methods of analyzing and protecting network infrastructure against DDoS (Distributed Denial of Service) attacks are discussed. A DDoS detection model has been developed using statistical techniques, which highlights the main stages of the attacks and key characteristics of network traffic that are crucial for detecting an attack. Potential and attack power are introduced as main concepts in assessing DDoS activity. To identify the type of attack, it is suggested to increase the sensitivity of the model by identifying key characteristics that distinguish between different attack stages. The features of various DDoS attack types, such as UDP Flood, UDP Reflection/Amplification, and TCP SYN Flood, are considered. A framework for modeling DDoS network attacks has been created. DDoS attacks including UDP Flood, UDP Reflection/Amplification and TCP SYN Flood were simulated using traffic data collected via the NetFlow protocol. The proposed attack characteristics, including speed, flow volume, and flow rate, allowed us to evaluate the attack's power and consider how to change the key characteristics of network traffic.
APA, Harvard, Vancouver, ISO, and other styles
2

Tumbinskaya, Marina V., Vasily V. Vоlkоv, and Bulat G. Zagidullin. "Use of statistical methods for analysis and forecast of udp-flood attacks." Journal Of Applied Informatics 15, no. 89 (2020): 85–102. http://dx.doi.org/10.37791/2687-0649-2020-15-5-85-102.

Full text
Abstract:
Web resources are an integral part of the life of a modern person, who are now more and more often subjected to hacker attacks. The most popular types of attacks are the SQL-injections and cross-site scripting, but DDoS attacks continue to be in the top 10 of network attacks and lead to serious crashes and failures of web resources. The most common type of DDoS attack is UDP flood attack, based on the infinite sending of UDP packets to ports of various UDP services. The scientific novelty of the work lies in the fact that to increase the level of security of web resources a medium-term forecast of cyber attacks of the UDP-flood type, using the methods of correlation analysis, based on the additive time series model, is proposed taking into account seasonal factors and time duration, which will ensure the necessary level of web security -resources. The type of UDP-flood attacks was chosen as the object of study. Using the methods of correlation analysis and modeling, we calculated the seasonal index of UDP flood attacks, and the autocorrelation of the time series of this type of attack. Using the method of simple exponential smoothing, a forecast of UDP-flood attacks is constructed. The paper proposes a classification of DDoS attacks, describes protection methods. Based on the correlation analysis, the predicted values of the impact of UDP flood attacks on web resources are calculated, and the seasonal factor is revealed. The largest number of attacks is expected in the IV quarter of 2020. For DDoS attacks lasting up to 20 minutes, seasonality was also revealed in the 1st quarter of the calendar year, which means that in the 1st quarter of 2020 the largest number of attacks of this duration should be expected. Prospects for further research into the problem of protection against DDoS attacks are presented in the further development of the methodology for countering UDP flood attacks and information security algorithms for web resources, which will reduce the number of UDP flood attacks and increase the level of web resource security.
APA, Harvard, Vancouver, ISO, and other styles
3

Riyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.

Full text
Abstract:
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Nuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.

Full text
Abstract:
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Warcita, Kurniabudi, and Eko Arip Winanto. "Detection of UDP Flooding DDoS Attacks on IoT Networks Using Recurrent Neural Network." Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 13, no. 3 (2024): 471–81. https://doi.org/10.23887/janapati.v13i3.79601.

Full text
Abstract:
Internet of Thing (IoT) is a concept where an object can transfer data through a network without requiring human interaction. Complex IoT networks make it vulnerable to cyber attacks such as DDoS UDP Flood attacks, UDP Flood attacks can disrupt IoT devices. Therefore, this study proposes an attack detection method using a deep learning approach with the Recurrent Neural Network (RNN) method. This study uses Principle Component Analysis (PCA) to reduce the feature dimension, before learning using RNN. The purpose of this study is to test the combined performance of the PCA and RNN methods to detect DDoS UDP Flood attacks on IoT networks. The testing in this study used 10 datasets sourced from CICIOT2023 containing UDP Flood and Benign DDoS traffic data, and the testing was carried out using three epoch parameters (iterations), namely 10, 50, and 100. The test results using RNN epoch 100 were superior, showing satisfactory performance with an accuracy value of 98%, precision of 99%, recall of 99%, and f1-score of 99%. Based on the experimental results, it can be concluded that combining PCA and RNN is able to detect UDP Flooding attacks by showing high accuracy.
APA, Harvard, Vancouver, ISO, and other styles
6

Tung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (2020): 1239. http://dx.doi.org/10.3390/electronics9081239.

Full text
Abstract:
Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time.
APA, Harvard, Vancouver, ISO, and other styles
7

Nedyalkov, Ivan. "Studying the Impact of a UDP DoS Attack on the Parameters of VoIP Voice and Video Streams." Future Internet 17, no. 4 (2025): 139. https://doi.org/10.3390/fi17040139.

Full text
Abstract:
This work studies the hypothesis of whether the UDP DoS attack affects voice and video flows in a VoIP network. It is a continuation of a previous work that studied the same hypothesis, but the VoIP server was under different types of TCP DoS attacks. The studied VoIP platform is the Asterisk FreePBX. A simple IP network model was developed for the purpose of the study. The used platform for the modeling of IP networks is GNS3. The study is conventionally divided into two parts: in the first part, only voice streams are exchanged in the network, and the server is subjected to a UDP DoS attack, and in the second part, only video streams are exchanged in the network, and again, Asterisk is subjected to a UDP DoS attack. The obtained results confirm the results of the previous study—the performance of the Asterisk FreePBX is not affected by the UDP DoS attack. Although the server is flooded with UDP packets, it works and is not blocked, and different types of VoIP calls are realized without problems. The UDP DoS attack does not affect the parameters of voice and video VoIP streams.
APA, Harvard, Vancouver, ISO, and other styles
8

Alexis Fidele, Kagiraneza, Suryono, and Wahyul Amien Syafei. "Denial of Service (DoS) attack identification and analyse using sniffing technique in the network environment." E3S Web of Conferences 202 (2020): 15003. http://dx.doi.org/10.1051/e3sconf/202020215003.

Full text
Abstract:
Network-based intruders such as (DoS) attacks have become one of the most significant internet interruptions. Some operations that rely on the internet, such as banking transactions, education, trade marketing, and social networking, have become the primary targets. The attacker is trying to surround and making it difficult for the system to defend. The research's objective is to recognize the characteristics and level of DoS attacks. In understanding the behavior of intruders against a target web server, Wireshark was used in all traffic networks—capturing the traffic in a networked environment. In this research, the user identifies the attack levels (TCP SYN, UDP, and HTTP protocol), ranging from low (Q1), medium (Q2), and high (Q4) attacks. The approach is to simulate the TCP, HTTP, and UDP flood attacks and analyze the attacks' effects on the network environment. In this work, normal scenarios and pattern attacks were compared. In this case, the intruder floods unwanted packets to the victim with a massive number of request packets; the SYN from the corresponding SYN-ACK replies are not achieved. This paper will identify the DoS attacks level and analyze the behavior of traffics.
APA, Harvard, Vancouver, ISO, and other styles
9

Joseph, Ofir, Avshalom Elmalech, and Chen Hajaj. "Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning." Electronics 12, no. 5 (2023): 1091. http://dx.doi.org/10.3390/electronics12051091.

Full text
Abstract:
Covert communication channels are a concept in which a policy-breaking method is used in order to covertly transmit data from inside an organization to an external or accessible point. VoIP and Video systems are exposed to such attacks on different layers, such as the underlying real-time transport protocol (RTP) which uses Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) packet streams to punch a hole through Network address translation (NAT). This paper presents different innovative attack methods utilizing covert communication and RTP channels to spread malware or to create a data leak channel between different organizations. The demonstrated attacks are based on a UDP punch hole created using Skype peer-to-peer video conferencing communication. The different attack methods were successfully able to transmit a small text file in an undetectable manner by observing the communication channel, and without causing interruption to the audio/video channels or creating a noticeable disturbance to the quality. While these attacks are hard to detect by the eye, we show that applying classical Machine Learning algorithms to detect these covert channels on statistical features sampled from the communication channel is effective for one type of attack.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Haojun. "Distributed Denial of Service Attack with Large Language Model." Highlights in Science, Engineering and Technology 138 (May 11, 2025): 132–37. https://doi.org/10.54097/586gg060.

Full text
Abstract:
Distributed Denial of Service (DDoS) attacks take full advantage of distributed networks by sending a relentless barrage of requests to a target server to disrupt the regular operation of the server. The main difference between a DDoS attack and a traditional Denial of Service (DoS) attack is its decentralized nature. This characteristic increases the attack's impact and thus creates incredible difficulty in prevention. Traditional DDoS strategies cover flooding attacks (e.g., TCP SYN and UDP floods), protocol usage techniques (e.g., SYN floods and the infamous Ping of Death), and resource exhaustion strategies (e.g., HTTP floods). Each of these proposed strategies relies on large amounts of bandwidth, and recent results achieved on detection systems provide more efficient mitigation means. A significant change in the pattern of modern DDoS attacks shows the rise of amplification attacks, an attack strategy that cleverly exploits weaknesses to increase traffic beyond its initial scale. In addition, the phenomenon of hybrid attacks has become more prominent, which integrates various DDoS tactics into more sophisticated and powerful attacks, e.g., combining application-layer attacks and traffic flooding, thereby crippling both the application and network layers. As network threats become more sophisticated, we must innovate our defence strategies to ensure their effectiveness. In order to gain a deeper understanding of the potential threat of DDoS, it is critical to delve deeper into traditional attack tactics, analyze specific case studies in depth, and explore the impact of emerging technologies. This article delves into traditional DDoS attacks, current threat perceptions, and how artificial intelligence can play a role in the face of these cold attacks.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "UDP attacks"

1

Muharish, Essa Yahya M. "PACKET FILTER APPROACH TO DETECT DENIAL OF SERVICE ATTACKS." CSUSB ScholarWorks, 2016. https://scholarworks.lib.csusb.edu/etd/342.

Full text
Abstract:
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories and existing countermeasures based on preventing, detecting, and responding are reviewed. Henceforward, a neural network learning algorithms and statistical analysis are utilized into the designing of our proposed packet filtering system.
APA, Harvard, Vancouver, ISO, and other styles
2

Plašil, Matouš. "Soubor laboratorních úloh k demonstraci počítačových útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220402.

Full text
Abstract:
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.
APA, Harvard, Vancouver, ISO, and other styles
3

Jawad, Dina, and Felicia Rosell. "Speak-up as a Resource Based Defence against Application Layer Distributed Denial-of-Service Attacks." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166597.

Full text
Abstract:
Under de senaste åren har antalet DDoS-attacker i Internets applikationsskikt ökat. Detta problem behöver adresseras. Den här rapporten presenterar ett antal existerande metoder för att upptäcka och skydda mot DDoS-attacker i applikationsskiktet. En metod för detta ändamål är att hitta avvikelser av olika typer hos de attackerande klienterna, för att urskilja mellan attackerande och vanliga klienter. Detta är ett brett utforskatförsvarsområde med många positiva resultat, men dessa metoder har ett antal brister, som att de kan resultera i både falska positiva och negativa resultat. En metod som ännu inte har undersökts tillräckligt är resurs-baserat försvar. Det är en metod med mycket potential, eftersom den tydligare kan skilja på goda och onda klienter under en DDoS-attack. Speak-up är en sådan metod och är huvudfokus i denna rapport. För- och nackdelarna med Speak-up har undersökts och resultaten visar på att Speak-up har potential till att bli ett kraftfullt verktyg mot DDoS-attacker. Speak-up har dock sina begränsningar och är därför inte det bästa alternativet under vissa typer av dessa DDoS-attacker.<br>In recent years, the internet has endured an increase in application layer DDoS attacks. It is a growing problem that needs to be addressed. This paper presents a number of existing detection and protection methods that are used to mitigate application layer DDoS attacks. Anomaly detection is a widely explored area for defence and there have been many findings that show positive results in mitigating attacks. However, anomaly detection possesses a number of flaws, such as causing false positives and negatives. Another method that has yet to become thoroughly examined is resource based defence. This defence method has great potential as it addresses clear differences between legitimate users and attackers during a DDoS attack. One such defence method is called Speak-up and is the center of this paper. The advantages and limitations of Speak-up have been explored and the findings suggest that Speak-up has the potential to become a strong tool in defending against DDoS attacks. However, Speak-up has its limitations and may not be the best alternative during certain types of application layer DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Montes, Larios Jose Manuel, and Hernández Manuel Antonio Iturrizaga. "Diseño de arquitectura de seguridad perimetral para una empresa dedicada a la actividad inmobiliaria." Bachelor's thesis, Universidad Ricardo Palma, 2015. http://cybertesis.urp.edu.pe/handle/urp/1285.

Full text
Abstract:
Debido a que el uso de Internet se encuentra en aumento, cada vez más compañías permiten a sus socios y proveedores acceder a sus sistemas de información. Por lo tanto, es fundamental saber qué recursos de la compañía necesitan protección para así controlar el acceso al sistema y los derechos de los usuarios del sistema de información. A su vez día a día se descubren nuevas vulnerabilidades, nuevos tipos de ataques y nuevos parches que aplicar los sistemas institucionales, convirtiendo la operación de la seguridad en una tarea sumamente compleja y demandante. El presente documento es sobre el desarrollo de la seguridad perimetral en la empresa Los Portales, vale indicar que dicha empresa es una de las más renombradas a nivel de la actividad inmobiliaria en el Perú, por ende se está considerando las amenazas de seguridad desde perspectivas diferentes para permitir de esta forma conocer algunos riesgos que puedan afectar a la institución, así como determinar el nivel de madurez de la seguridad informática, a su vez se demostrara a detalle el diseño e implementación de la solución así como el alcance económico. Because Internet use is increasing, more and more companies allow their partners and suppliers access to their information systems. Therefore, it is essential to know what company resources need protection so as to control system access and the rights of users of the information system. In turn every day new vulnerabilities, new types of attacks and new patches to apply institutional systems, making the security operation in an extremely complex and demanding task are discovered. This thesis is on the development of perimeter security at Los Portales, it indicate that the company is one of the most renowned level of real estate activity in Peru, thus being considered security threats from different perspectives to meet thus enable some risks that may affect the institution, and to determine the maturity level of computer security, in turn demonstrate in detail the design and implementation of the solution as well as the economic scope.
APA, Harvard, Vancouver, ISO, and other styles
5

Stéen, Alexandra. "Räck upp handen! Vem vill bli spottad i ansiktet på jobbet? : En rättsdogmatisk studie om polisens möjligheter till kränkningsersättning när de själva blir ett brottsoffer." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-68921.

Full text
Abstract:
The Swedish police force is obligated to protect its citizens to maintain public order and to prevent and discover criminality in society. They work around the clock, every day throughout the year for the country’s security, freedom and democracy. But what happens when they themselves become victims of abuse and harassment, because of their job? The police are additionally protected by law when they are attacked in their uniform at work and this means an attack should be faced with punishment accordingly. The police force is a group in society who is more exposed to violence and who are trained how to deal with aggressive and threatening situations. Therefore, the tolerance level is expected to be much higher among the police and because of this, it can be more difficult for them to receive fair compensation when they have been attacked. This thesis aims to show the difficulties the police can face when declaiming compensation for work related attacks. The thesis also intends to investigate under what circumstances a policeman can get compensation.   The study will immerse in and analyse Swedish law together with case law, investigating if the courts lack consistency in their judgment whether or not the police should be entitled to compensation. In order to answer the study’s research questions, a legal dogmatic method has been used.
APA, Harvard, Vancouver, ISO, and other styles
6

Montoya, Maxime. "Sécurité adaptative et énergétiquement efficace dans l’Internet des Objets." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM032.

Full text
Abstract:
La sécurité des circuits intégrés pour l’IoT est généralement incompatible avec la faible consommation énergétique attendue de ces circuits. Cette thèse a donc pour but de proposer de nouvelles manières de concilier sécurité et efficacité énergétique pour les circuits intégrés.Dans un premier temps, la sécurisation d’un mécanisme de gestion de l’énergie est étudiée. Les radios de réveil permettent de gérer la sortie de veille d’objets connectés, en réveillant un tel objet lors de la réception d’un code de réveil spécifique, mais elles sont vulnérables aux attaques par déni de sommeil, qui consistent à réveiller constamment l’objet en répétant un même code de réveil de sorte à vider sa batterie. Une nouvelle manière de générer des codes de réveils est proposée, qui permet de contrer efficacement ces attaques avec un coût négligeable en énergie.Dans un second temps, l’efficacité énergétique des contre-mesures contre les attaques matérielles est améliorée à travers deux approches différentes. Une nouvelle contre-mesure mixte, ayant une consommation énergétique plus faible que les protections mixtes existantes, est proposée ; elle consiste en un lissage algorithmique de la consommation offrant une détection intrinsèque des fautes. L’implémentation adaptative de contre-mesures matérielles est également proposée ; elle consiste à moduler le niveau de protection fourni par ces contre-mesures au cours du fonctionnement d’un algorithme protégé, afin d’optimiser la sécurité et la consommation énergétique. Une évaluation de la sécurité des contre-mesures montre qu’elles fournissent une protection efficace contre les attaques matérielles existantes<br>The goal of this work is to propose new methods that provide both a high security and a high energy efficiency for integrated circuits for the IoT.On the one side, we study the security of a mechanism dedicated to energy management. Wake-up radios trigger the wake-up of integrated circuits upon receipt of specific wake-up tokens, but they are vulnerable to denial-of-sleep attacks, during which an attacker replays such a token indefinitely to wake-up a circuit and deplete its battery. We propose a new method to generate unpredictable wake-up tokens at each wake-up, which efficiently prevents these attacks at the cost of a negligible energy overhead.On the other side, we improve on the energy efficiency of hardware countermeasures against fault and side-channel attacks, with two different approaches. First, we present a new combined countermeasure, which increases by four times the power consumption compared to an unprotected implementation, introduces no performance overhead, and requires less than 8 bits of randomness. Therefore, it has a lower energy overhead than existing combined protections. It consists in an algorithm-level power balancing that inherently detects faults. Then, we propose an adaptive implementation of hardware countermeasures, which consists in applying or removing these countermeasures on demand, during the execution of the protected algorithm, in order to tune the security level and the energy consumption. A security evaluation of all the proposed countermeasures indicates that they provide an efficient protection against existing hardware attacks
APA, Harvard, Vancouver, ISO, and other styles
7

Wei, Hung-Chuan, and 魏鴻娟. "Counteracting UDP Flooding Attacks in SDN." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/56753540948380371723.

Full text
Abstract:
碩士<br>元智大學<br>資訊工程學系<br>104<br>Software-defined networking (SDN) is a new network architecture with the central control. The purpose is to allow network to become more flexible and easier to manage. Besides, the need for the resources and services of applications can have better also management. SDN architecture is to separate the control plane and data plane. Control plane uses a controller to centrally manage SDN switch, while the data plane handles only data transmission, which can reduce the difficulty of management. SDN using OPENFLOW protocol to connect the control plane and data plane, so that when the packet enters first into the flow table, the matching flows can be forwarded directly. SDN has been proven successful in improving not only network performance but also network security. However, the centralized control in SDN architecture incurs new security vulnerabilities. Because all of the management functionality are in the controller, the UDP flooding attack can be easily launched and causes serious packet transmission delay, performance loss on the controller and therefore even network shutdown. Therefore, in this thesis, for UDP flood attack, we will carry out a simulation to prove flooding attack can harm the controller. After that, the defense presented a lightweight method is presented. Via the experiments, we demonstrate the performance and safety of our proposed defense mechanism. The advantage of our defense is that it will not incur too much computation and communication burden if no attack is launched. The controller itself has no need to be modified with our defense mechanism. In particular, our defense can always monitor the status of the controller. If necessary, add flow table rules to ensure normal operation of the controller and the network.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "UDP attacks"

1

Brownlow, Michael. Kraken attack! Macmillan Children's Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

ill, Carter David A., ed. Snack attack: A tasty pop-up book. Simon and Schuster Books for Young Readers, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Morton, Robert. Sir Rutherford Alcock. Amsterdam University Press, 2024. https://doi.org/10.5117/9789463725293.

Full text
Abstract:
The son of a village doctor, Rutherford Alcock trained in medicine and became a battlefield surgeon, working in Portugal and Spain during the civil wars there in the 1830s. In a major career shift, he entered the consular service, went to China, and ended up as British Minister (the equivalent of today’s ambassador) to Japan and then China. This progression was unique, indeed bizarre, especially as every senior position he got was one he specifically said he did not want. Nonetheless, he was the man who commenced Britain’s relations with Japan and introduced Japan’s arts and crafts to the UK, in addition to playing a central role in Britain’s relationship with China. He was no rampant imperialist and expressed ambivalence about Britain’s position in East Asia as he contended with intractable issues like the opium trade and how to punish attacks on British interests without starting a war. This book fills a major gap in the study of Japan’s opening to the West from a British perspective, as well as Britain’s relationship with East Asia as a whole, through the eyes of a brilliant, but complicated and contradictory figure.
APA, Harvard, Vancouver, ISO, and other styles
4

Atkins, Stephen E. The 9/11 Encyclopedia [2 volumes]. Praeger, 2008. http://dx.doi.org/10.5040/9798216190325.

Full text
Abstract:
Horror. Sadness. Protests. Military action. Conspiracy theories. From personal loss to economic upheaval to a paradigm shift in U.S. foreign relations, few events in the past 100 years have impacted American life so greatly as the terrorist attacks of September 11, 2001. This comprehensive two-volume set details every event leading up to 9/11, going back up to a decade prior to the attacks, and including all participants from any place in the world. Also covered are events since the attack that have influenced our understanding of the ordeal. With A-Z entries, descriptive sidebars, and over 40 primary documents,The 9/11 Encyclopediais an essential source for understanding one of the blackest marks on the pages of American history.
APA, Harvard, Vancouver, ISO, and other styles
5

Mickolus, Edward F., and Susan L. Simmons. Terrorism, 1996-2001. Greenwood Publishing Group, Inc., 2002. http://dx.doi.org/10.5040/9798216192497.

Full text
Abstract:
The most comprehensive source of global terrorist information is now up-to-date with the latest events, including the devastating attack of September 11, 2001, its aftermath, and the mysterious anthrax letters. This 2-volume set provides meticulous, comprehensive data on every international act of terrorism since 1996, including information on the terrorists and their victims, discussions of the judicial fate of the perpetrators, and details on governmental responses. This is the latest in Mickolus' series of chronologies dating back to 1960 and includes updated information on earlier terrorist attacks. Mickolus' chronologies—soon to be available online from Greenwood—are widely recognized for their authority and excellence. Legislators, prosecutors, scholars, international organizations, intelligence and defense institutions, journalists, and countless students have utilized them for years.
APA, Harvard, Vancouver, ISO, and other styles
6

Ward, David, and Paul Wooderson. Automotive Cybersecurity: An Introduction to ISO/SAE 21434. SAE International, 2021. http://dx.doi.org/10.4271/9781468600810.

Full text
Abstract:
Industries, regulators, and consumers alike see cybersecurity as an ongoing challenge in our digital world. Protecting and defending computer assets against malicious attacks is a part of our everyday lives. From personal computing devices to online financial transactions to sensitive healthcare data, cyber crimes can affect anyone. As technology becomes more deeply embedded into cars in general, securing the global automotive infrastructure from cybercriminals who want to steal data and take control of automated systems for malicious purposes becomes a top priority for the industry. Systems and components that govern safety must be protected from harmful attacks, unauthorized access, damage, or anything else that might interfere with safety functions. Automotive Cybersecurity: An Introduction to ISO/SAE 21434 provides readers with an overview of the standard developed to help manufacturers keep up with changing technology and cyber-attack methods. ISO/SAE 21434 presents a comprehensive cybersecurity tool that addresses all the needs and challenges at a global level. Industry experts, David Ward and Paul Wooderson, break down the complex topic to just what you need to know to get started including a chapter dedicated to frequently asked questions. Topics include defining cybersecurity, understanding cybersecurity as it applies to automotive cyber-physical systems, establishing a cybersecurity process for your company, and explaining assurances and certification.
APA, Harvard, Vancouver, ISO, and other styles
7

Atkins, Stephen, ed. The 9/11 Encyclopedia. 2nd ed. ABC-CLIO, 2011. http://dx.doi.org/10.5040/9798400605918.

Full text
Abstract:
This work offers a sweeping collection of A–Z entries and primary source documents that presents a thorough examination of all the individuals, groups, and events surrounding the 9/11 terrorist attacks. Commemorating the 10th anniversary of the attacks on the World Trade Center and Pentagon,The 9/11 Encyclopedia: Second Editionoffers valuable perspective on this emotionally charged and multidimensional subject. This comprehensive two-volume encyclopedia details the events leading up to the attacks, going back a decade prior to 9/11, and covers all the major players involved. It also examines events and discoveries since 2001 that have influenced our understanding of—and reactions to—the world-changing attacks. In the second edition, dozens of entries have been updated and many new ones added. The documents volume has been expanded as well. With more than 170 A–Z entries, dozens of descriptive sidebars, and over 55 primary-source documents, this updated encyclopedia is an essential source for comprehending one of the darkest moments in American history.
APA, Harvard, Vancouver, ISO, and other styles
8

Springer, Paul J. Cyber Warfare. ABC-CLIO, LLC, 2015. http://dx.doi.org/10.5040/9798400636486.

Full text
Abstract:
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat—from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This essential reference—the only of its kind to include an overview of other cyber warfare literature—emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers.
APA, Harvard, Vancouver, ISO, and other styles
9

Kachun, Mitch. Michelle Obama, the Media Circus, and America’s Racial Obsession. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036606.003.0004.

Full text
Abstract:
This chapter shifts the focus to Michelle Obama, a figure whose family's experiences of enslavement, emancipation, and northward migration make her nearly as important a cultural figure as her husband. It explains how media coverage of Michelle Obama during the campaign was shaped not only by Americans' expectations of prospective first ladies, but by a long history of powerful stereotypes of black women and their bodies. While praised and admired by many, Michelle Obama had become a target whose attackers utilized an ever-expanding twenty-four/seven cable news cycle and the unprecedented forum of the blogosphere to promulgate every sort of personal and political attack. In the process, they dredged up deep-seated stereotypes of African American women—the domineering “mammy,” the hypersexualized “jezebel,” the more recently minted “angry black woman”—and used them to construct an unappealing and even threatening image of the candidate's wife.
APA, Harvard, Vancouver, ISO, and other styles
10

Collins, John, and Tamara Dobler, eds. Reply to François Recanati. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198783916.003.0020.

Full text
Abstract:
In his present contribution François Recanati has said some very kind things about me and some very astute things about language. He recognizes something new and important which came into prominence, and enjoyed its heyday, at least in Anglophone philosophy, roughly in a post-war period stretching up to around Austin’s death in 1962. This was a period marked by a new sort of conception of what a philosophical question might be, and how one might coherently be formulated—of what philosophy ought to look like. He recognizes, too, those waiting in the wings to turn the clock back to a time of what they saw as a less complicated, more straightforward, and more comfortable form of philosophy; one in which we need not question ourselves, and our own ability to find our way about, to the extent that Austin and Wittgenstein asked us to do. Austin’s death was a signal to such philosophers to launch their attack. And Recanati has done much detailed work to show how such attacks—ones deploying such things as ‘the Geach point’ and Grice’s deployment of the notion implicature—come up short. What I will aim for here is to place what he sees in a somewhat wider setting. In it some of his main points can be supported in a slightly different way. I will also come to one point, at the end, on which, as frequent allies as we are, we part company....
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "UDP attacks"

1

Booth, Todd G., and Karl Andersson. "Elimination of DoS UDP Reflection Amplification Bandwidth Attacks, Protecting TCP Services." In Communications in Computer and Information Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19210-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boro, Debojit, Himant Basumatary, Tribeni Goswami, and Dhruba K. Bhattacharyya. "UDP Flooding Attack Detection Using Information Metric Measure." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Muthurajkumar, S., A. Geetha, S. Aravind, and H. Barakath Meharajnisa. "UDP Flooding Attack Detection Using Entropy in Software-Defined Networking." In Algorithms for Intelligent Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3951-8_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ihsan, Zohair, Mohd Yazid Idris, Khalid Hussain, Deris Stiawan, and Khalid Mahmood Awan. "Protocol Share Based Traffic Rate Analysis (PSBTRA) for UDP Bandwidth Attack." In Informatics Engineering and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25327-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mohan, V., B. K. Madhavi, and S. B. Kishor. "Deep Neural Network Model for UDP SYN Flood Distributed DoS Attack Detection in SDN." In Learning and Analytics in Intelligent Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82706-8_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mopuri, Konda Reddy, Phani Krishna Uppala, and R. Venkatesh Babu. "Ask, Acquire, and Attack: Data-Free UAP Generation Using Class Impressions." In Computer Vision – ECCV 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01240-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dasari, Kishorebabu, and Srinivas Mekala. "UDP Flood DDoS Attack Detection Using Multilayer Perceptron Different Optimization Techniques with Pearson, Spearman and Kendall Uncorrelated Feature Subsets." In Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-2742-5_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mohan, V., B. K. Madhavi, and S. B. Kishor. "Detection of UDP SYN Flood DDoS Attack Using Random Forest Machine Learning Algorithm in a Simulated Software Defined Network." In ICT for Intelligent Systems. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3982-4_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Huiwang, and Ya Li. "Query-UAP: Query-Efficient Universal Adversarial Perturbation for Large-Scale Person Re-Identification Attack." In Pattern Recognition and Computer Vision. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-18913-5_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Verma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Research Anthology on Combating Denial-of-Service Attacks. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch030.

Full text
Abstract:
Vehicular Ad-Hoc Network (VANET) is a subset of Mobile Ad-Hoc Network (MANET) and it is considered as a substantial component of Intelligent Transportation System (ITS). DoS attacks on VANET are varying and may be overwhelmed by VANET protocols, such as TCP or UDP flooding attacks. Different secure communications models can be used to detect and prevent IP spoofing DoS attacks, by which the attacks are committed by fraudulent and malicious nodes. In this chapter, an efficient detection method has been proposed to detect UDP flooding attacks, called Bloom-Filter-Based IP-CHOCK (BFICK). A prevention method using IP-CHOCK has also been proposed to prevent DoS, called Reference Broadcast Synchronization (RBS). In principle, the combined method is based on the IP-CHOCK filter concept of packets during an attack incident and with busy traffic condition. Fake identities from malicious vehicles can be analyzed with help of the existing reliable IP addresses. Beacon packets were exchanged periodically by all the vehicles to announce their presence and to forward it to the next node.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "UDP attacks"

1

Romadhon, Faizal Wahyu, Muhammad Azza Ulin Nuha, Yusuf Adiprawira, and Riri Fitri Sari. "Comparative Analysis of HAProxy and Nginx Load Balancers in Mitigating User Datagram Protocol (UDP) Flood Attacks." In 2024 12th International Conference on Information and Communication Technology (ICoICT). IEEE, 2024. http://dx.doi.org/10.1109/icoict61617.2024.10698656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sachdeva, Rachneet, Haritz Puerto, Tim Baumgärtner, et al. "UKP-SQuARE v2: Explainability and Adversarial Attacks for Trustworthy QA." In Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 12th International Joint Conference on Natural Language Processing: System Demonstrations. Association for Computational Linguistics, 2022. http://dx.doi.org/10.18653/v1/2022.aacl-demo.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Yufei, Ziqi Zhou, Minghui Li, et al. "PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation." In ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025. https://doi.org/10.1109/icassp49660.2025.10890418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Menendez, C. M., V. Jovancicevic, S. Ramachandran, M. Morton, and D. Stegmann. "New Method for Assessing Corrosion under Iron Sulfide Deposits and CO2/H2S Conditions." In CORROSION 2011. NACE International, 2011. https://doi.org/10.5006/c2011-11265.

Full text
Abstract:
Abstract The presence of surface deposits, such as sand, iron sulfide or organic solids in oil and gas production systems can lead to premature failure of fluid-handling equipment. When corrosion occurs under solid deposition, the process of corrosion is often referred to as under-deposit corrosion (UDC). The UDC mechanism is dependent upon the local operating conditions, such as gas composition, conditions of fluid flow, and solid content of the fluids. In this work, a new monitoring method was developed to study the corrosion that occurs under a relatively thick layer of deposits. Iron sulfide deposits obtained from various sources were characterized with respect to their particle size, crystalline structure and surface composition using particle size analysis, X-ray diffraction (XRD) and X-ray photoelectron spectroscopy (XPS). Autoclave testing in conjunction with localized corrosion monitoring and optical profiling was employed to evaluate the corrosion attack under the deposits. Optical profiling was found to be beneficial to quantify localized and general corrosion attack in the absence of electrochemical corrosion rate monitoring. It was determined that mackinawite precipitation from the bulk solution is the best method for reproducing localized corrosion morphology observed in the field. It was found that when lab synthesized or in-situ precipitated mackinawite was deposited on a metal surface, significant general and localized corrosion was observed. This finding is important since it can explain localized corrosion observed in sour gas systems where iron sulfide is deposited.
APA, Harvard, Vancouver, ISO, and other styles
5

Wei, Hung-Chuan, Yung-Hao Tung, and Chia-Mu Yu. "Counteracting UDP flooding attacks in SDN." In 2016 IEEE NetSoft Conference and Workshops (NetSoft). IEEE, 2016. http://dx.doi.org/10.1109/netsoft.2016.7502468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mutu, Laura, Rania Saleh, and Ashraf Matrawy. "Improved SDN responsiveness to UDP flood attacks." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thomas, Daniel R., Richard Clayton, and Alastair R. Beresford. "1000 days of UDP amplification DDoS attacks." In 2017 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 2017. http://dx.doi.org/10.1109/ecrime.2017.7945057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Biagioni, Edoardo. "Preventing UDP Flooding Amplification Attacks with Weak Authentication." In 2019 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2019. http://dx.doi.org/10.1109/iccnc.2019.8685648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lee, Junseok, Minhyeong Kim, Wonjun Song, Younghoon Kim, and Dohyung Kim. "Rescuing QUIC Flows From Countermeasures Against UDP Flooding Attacks." In SAC '24: 39th ACM/SIGAPP Symposium on Applied Computing. ACM, 2024. http://dx.doi.org/10.1145/3605098.3635885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Walia, Rubika, and Prachi Garg. "Cryptography: Analysis of SYN and UDP Attacks using wire shark." In 2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST). IEEE, 2021. http://dx.doi.org/10.1109/iccmst54943.2021.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "UDP attacks"

1

Jenkins, Brian, Bruce Butterworth, and Sachi Yagu. Evolving Patterns of Violence in Developing Countries. Mineta Transportation Institute, 2023. http://dx.doi.org/10.31979/mti.2024.2344.

Full text
Abstract:
In August 2022, MTI issued a report entitled Changing Patterns of Violence Pose New Challenges to Public Surface Transportation in the United States. That report analyzed the frequency and lethality of attacks on public surface transport in economically advanced countries. But what has been going on in non-economically advanced countries – the vast majority of countries in the world? Using the MTI database of Terrorist and Serious Criminal Attacks Against Public Surface Transportation, the authors analyzed attacks against passenger trains and train stations, buses and bus stations and stops, and all rail infrastructure and operating and security personnel in both sets of countries between January 1, 2004, and December 31, 2022. For this analysis, countries that are economically advanced are based mostly on OCED membership and are designated as Group 1, and those with developing economies and others that are not OECD members, are designated as Group 2. (Group 3 countries are Israel and territory controlled by the Palestinian authority, which MTI will address in a separate report). This report focuses on Group 2 countries, comparing them to Group 1 countries. Group 2 had more than 7 times the number of attacks, and the lethality of its attacks was 3 times greater than in Group 1. In Group 2, many countries have long-running insurgencies that produce frequent and lethal attacks. There are far more attacks on buses and bus depots and stops in Group 2, reflecting greater reliance on bus travel. Explosives dominate attack methods, and while jihadist attackers are responsible for only 9.7% of attacks, they create 33.7% of fatalities. Jihadists are the most lethal attackers in both Group 1 and Group 2 countries. Suicide attacks account for only about 3% of the attacks in both groups, but while that percentage has gone down in Group 1, it has gone up in Group 2.
APA, Harvard, Vancouver, ISO, and other styles
2

de Abreu Castro, Jonas, and Mariana Cunha e Melo. Password management: Where LastPass got it wrong and how to approach the issue in organizations. Center for Technology and Public Interest, SL, 2023. http://dx.doi.org/10.59262/ce3fc7.

Full text
Abstract:
In August 2022, LastPass suffered two cyberattacks that breached customer data and encrypted passwords. LastPass acknowledged the attacks, but their communication was not transparent enough. In November 2022, a follow-up attack compromised customer data further. LastPass communicated that this was a low-risk attack and that customers did not need to take any action. However, in December 2022, LastPass admitted the actual scale of the breach, and that all customer vaults were compromised. It is important to note that every company suffers frequent attacks, but the proper security posture under this type of attack is to assume that everything will eventually get compromised. The incident makes a case for why companies should always deploy additional defenses, such as employing security keys, to stay secure in the long term.
APA, Harvard, Vancouver, ISO, and other styles
3

Kula, Gregory J. Assessing the Effects of Computer Network and Electronic Attack: Does Joint Doctrine Measure Up? Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada504932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Floyd, Jason, and Daniel Madrzykowski. Analysis of a Near Miss in a Garden Apartment Fire – Georgia 2022. UL's Fire Safety Research Institute, 2022. http://dx.doi.org/10.54206/102376/rsfd6862.

Full text
Abstract:
On February 9, 2022, Cobb County Fire and Emergency Services responded to a fire in a ground floor unit in a garden apartment building. At arrival, the fire was a post-flashover fire in a bedroom. Initial fire control was attempted by an interior fire attack team which was unable to quickly locate the fire. Exterior suppression through the bedroom window was started prior to discovery of the fire by the interior team. Shortly after fire discovery by the internal team, a mayday was called. Four firefighters from the interior fire attack team received first and second degree burns. This report analyzes photographic, video, and written documentation from the incident to evaluate the timeline of the incident and to assess the fire conditions present. Computer modeling using the Fire Dynamics Simulator (FDS) was performed to provide further insight into the fire conditions and the impact of decisions and actions on the fire ground. Additionally, data from a full scale fire test of a similar fire in a similar structure was used to provide additional insight. Four FDS simulations were performed in support of the analysis. These included a simulation of the event as it unfolded and three simulations looking at the impact of alternate tactics which included: initial exterior attack prior to entry, the use of a smoke curtain to protect the building exit path, and interior only attack. FDS simulations provided insight on the heat present in the apartment during the fire and the impact of the interior and exterior suppression on conditions inside the apartment. Full scale test data of a similar fire showed similar behavior to the FDS predictions and gives credence to the FDS results. Results of the analysis suggest that injuries resulted from the length of time the interior attack team was present inside the apartment before actions were taken to reduce the severity of the fire. Six contributing factors were identified including size-up, communication and accountability, delayed exterior attack, lack of entry hall protection, the apartment layout and construction, thermal imager use, and mayday procedures and training. The last contributing factor was a positive contribution that helped avoid more serious injuries. Based on the contributing factors, five recommendations were made that include improved size-up, exterior fire control to prevent exterior spread, protection of exit pathways, basing fire ground tactics on known information, and recognizing when a change in tactics is needed.
APA, Harvard, Vancouver, ISO, and other styles
5

Tanaka, Eri, Regina Schwerd, Wolfgang Hofbauer, and Daniel Zirkelbach. Laboratory tests on decay of natural fibre insulation materials suggest a more differentiated evaluation and higher RH thresholds. Department of the Built Environment, 2023. http://dx.doi.org/10.54337/aau541651346.

Full text
Abstract:
To reduce CO2 emissions and save grey energy, natural materials like wood and wooden materials are becoming more and more important. However, these products are particularly sensitive to moisture, as they can be attacked by mould or decay fungi. In contrast to mould growth, which typically is associated with visual impairment and health problems, the growth of decay fungi may result in structural defects which clearly must be excluded. Up to now it is mostly assumed that wooden materials are more sensitive to such attack than solid wood. Therefore, different wood fibre insulation materials were inoculated with decay fungi and exposed to different climates to determine the requirements for the decay process and to compare them with the requirements of decay by the same fungi of solid wood. The results prove that some natural fibre materials are equally or even more resistant to decay fungi than solid wood, while others are less. The resistant products can therefore be assessed like solid wood – for which already temperature dependent thresholds and in part also transient decay prediction models are available. Maybe even specific higher moisture levels can be acceptable. However, the results also suggest a differentiated view on natural fibre insulations, as they have a very different susceptibility to wood decay. Uniform and significantly lower limits than for solid wood are not justified.
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Ruo-xiang, Xun Li, Jing Li, et al. Does Chinese herbal remedy Tangcao tablet work for the treatment of HIV/AIDS:a systematic review of controlled clinical trials. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.6.0042.

Full text
Abstract:
Review question / Objective: This study aims to evaluate the effectiveness and safety of Tangcao tablet (Tangcao) for treating people with HIV/AIDS. Condition being studied: Acquired immunodeficiency syndrome (AIDS) is a chronic infectious disease characterized by severe immunodeficiency caused by the human immunodeficiency virus (HIV). The infection attacks specifically the white blood cells, CD4+T (CD4) cells, weakening the immunity of individuals against infections such as tuberculosis. Without treatment, patients with AIDS may survive up to 2 years. Pneumocystis pneumonia and infections of the central nervous system are two of the most common causes of death in people with AIDS. AIDS still remains a significant global public health problem, with an estimated 37.7 million people infected with HIV at the end of 2020.
APA, Harvard, Vancouver, ISO, and other styles
7

Drury, J., S. Arias, T. Au-Yeung, et al. Public behaviour in response to perceived hostile threats: an evidence base and guide for practitioners and policymakers. University of Sussex, 2023. http://dx.doi.org/10.20919/vjvt7448.

Full text
Abstract:
Background: Public behaviour and the new hostile threats • Civil contingencies planning and preparedness for hostile threats requires accurate and up to date knowledge about how the public might behave in relation to such incidents. Inaccurate understandings of public behaviour can lead to dangerous and counterproductive practices and policies. • There is consistent evidence across both hostile threats and other kinds of emergencies and disasters that significant numbers of those affected give each other support, cooperate, and otherwise interact socially within the incident itself. • In emergency incidents, competition among those affected occurs in only limited situations, and loss of behavioural control is rare. • Spontaneous cooperation among the public in emergency incidents, based on either social capital or emergent social identity, is a crucial part of civil contingencies planning. • There has been relatively little research on public behaviour in response to the new hostile threats of the past ten years, however. • The programme of work summarized in this briefing document came about in response to a wave of false alarm flight incidents in the 2010s, linked to the new hostile threats (i.e., marauding terrorist attacks). • By using a combination of archive data for incidents in Great Britain 2010-2019, interviews, video data analysis, and controlled experiments using virtual reality technology, we were able to examine experiences, measure behaviour, and test hypotheses about underlying psychological mechanisms in both false alarms and public interventions against a hostile threat. Re-visiting the relationship between false alarms and crowd disasters • The Bethnal Green tube disaster of 1943, in which 173 people died, has historically been used to suggest that (mis)perceived hostile threats can lead to uncontrolled ‘stampedes’. • Re-analysis of witness statements suggests that public fears of Germany bombs were realistic rather than unreasonable, and that flight behaviour was socially structured rather than uncontrolled. • Evidence for a causal link between the flight of the crowd and the fatal crowd collapse is weak at best. • Altogether, the analysis suggests the importance of examining people’s beliefs about context to understand when they might interpret ambiguous signals as a hostile threat, and that. Tthe concepts of norms and relationships offer better ways to explain such incidents than ‘mass panic’. Why false alarms occur • The wider context of terrorist threat provides a framing for the public’s perception of signals as evidence of hostile threats. In particular, the magnitude of recent psychologically relevant terrorist attacks predicts likelihood of false alarm flight incidents. • False alarms in Great Britain are more likely to occur in those towns and cities that have seen genuine terrorist incidents. • False alarms in Great Britain are more likely to occur in the types of location where terrorist attacks happen, such as shopping areass, transport hubs, and other crowded places. • The urgent or flight behaviour of other people (including the emergency services) influences public perceptions that there is a hostile threat, particularly in situations of greater ambiguity, and particularly when these other people are ingroup. • High profile tweets suggesting a hostile threat, including from the police, have been associated with the size and scale of false alarm responses. • In most cases, it is a combination of factors – context, others’ behaviour, communications – that leads people to flee. A false alarm tends not to be sudden or impulsive, and often follows an initial phase of discounting threat – as with many genuine emergencies. 2.4 How the public behave in false alarm flight incidents • Even in those false alarm incidents where there is urgent flight, there are also other behaviours than running, including ignoring the ‘threat’, and walking away. • Injuries occur but recorded injuries are relatively uncommon. • Hiding is a common behaviour. In our evidence, this was facilitated by orders from police and offers from people staff in shops and other premises. • Supportive behaviours are common, including informational and emotional support. • Members of the public often cooperate with the emergency services and comply with their orders but also question instructions when the rationale is unclear. • Pushing, trampling and other competitive behaviour can occur,s but only in restricted situations and briefly. • At the Oxford Street Black Friday 2017 false alarm, rather than an overall sense of unity across the crowd, camaraderie existed only in pockets. This was likely due to the lack of a sense of common fate or reference point across the incident; the fragmented experience would have hindered the development of a shared social identity across the crowd. • Large and high profile false alarm incidents may be associated with significant levels of distress and even humiliation among those members of the public affected, both at the time and in the aftermath, as the rest of society reflects and comments on the incident. Public behaviour in response to visible marauding attackers • Spontaneous, coordinated public responses to marauding bladed attacks have been observed on a number of occasions. • Close examination of marauding bladed attacks suggests that members of the public engage in a wide variety of behaviours, not just flight. • Members of the public responding to marauding bladed attacks adopt a variety of complementary roles. These, that may include defending, communicating, first aid, recruiting others, marshalling, negotiating, risk assessment, and evidence gathering. Recommendations for practitioners and policymakers • Embed the psychology of public behaviour in emergencies in your training and guidance. • Continue to inform the public and promote public awareness where there is an increased threat. • Build long-term relations with the public to achieve trust and influence in emergency preparedness. • Use a unifying language and supportive forms of communication to enhance unity both within the crowd and between the crowd and the authorities. • Authorities and responders should take a reflexive approach to their responses to possible hostile threats, by reflecting upon how their actions might be perceived by the public and impact (positively and negatively) upon public behaviour. • To give emotional support, prioritize informative and actionable risk and crisis communication over emotional reassurances. • Provide first aid kits in transport infrastructures to enable some members of the public more effectively to act as zero responders.
APA, Harvard, Vancouver, ISO, and other styles
8

Kemper, Bart. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities. SAE International, 2023. http://dx.doi.org/10.4271/epr2023028.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-source software over the past three years, which can cost up to millions of dollars per incident.&lt;/div&gt;&lt;div class="htmlview paragraph"&gt;&lt;b&gt;Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities&lt;/b&gt; discusses the verification, validation, and uncertainty quantification needed to vet systems before implementation and the continued maintenance measures required over the lifespan of software-integrated assets. It also proposes a certified System Software Integrator role that would be responsible for public safety in traditional infrastructure.&lt;/div&gt;&lt;div class="htmlview paragraph"&gt;&lt;a href="https://www.sae.org/publications/edge-research-reports" target="_blank"&gt;Click here to access the full SAE EDGE&lt;/a&gt;&lt;sup&gt;TM&lt;/sup&gt;&lt;a href="https://www.sae.org/publications/edge-research-reports" target="_blank"&gt; Research Report portfolio.&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;
APA, Harvard, Vancouver, ISO, and other styles
9

Erol, Selman, and Michael Junho Lee. Financial System Architecture and Technological Vulnerability. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1122.

Full text
Abstract:
This paper presents a framework to study of technological resiliency of financial system architecture. Financial market infrastructures, or platforms, compete with services critical functions along various stages in the lifecycle of a trade, and make investments in technological resiliency to guard against attackers seeking to exploit system weaknesses. Platforms’ financial network effects attenuate competition between platforms on security. Exposure to vulnerabilities is magnified in the presence of strategic adversaries. Private provision of technological resiliency is generally sub-optimal, with over- and underinvestment in security depending on market structure. Vulnerabilities evolve over the maturity of a financial system, but there generically exists a tipping point at which technological resiliency diverges from optimal and creates technological drag on the financial system. We find supportive evidence in tri-party repo settlement: the exit of duopolist resulted in a significant drop in IT-related investment by the sole provider, even as peer firms ramp up investment.
APA, Harvard, Vancouver, ISO, and other styles
10

Lahti, Yannick, and Emilia Palonen. The impact of the Russia–Ukraine war on right-wing populism in Finland. European Center for Populism Studies (ECPS), 2023. http://dx.doi.org/10.55271/rp0018.

Full text
Abstract:
As Finland’s neighbour, Russia, attacked its neighbour, Ukraine, the response across the political spectrum in Finland was universal. All the parties underscored the importance of patriotism and sovereignty and messages of solidarity and support for Ukraine (alongside condemnation of Russia). Support for Putin or the war is basically non-existent in Finland. Still, the Finns Party (FP), which is part of the populist Radical Right milieu in Finland, polls extremely well. Moreover, groups combining anti-COVID-19 measures with pro-Putin leanings have registered as political parties in preparation for elections in spring 2023. Still, their combined support is in single digits. The concrete consequences of the war include a U-turn in foreign policy from long-standing neutrality to NATO membership, with all parties—including the FP—supporting the government’s pending application to join alongside neighbouring Sweden. Interestingly, as the conflict heated up in early 2022, “Niikkogate”—a scandal in which a parliamentary committee chair from the FP was replaced after tweeting pro-Kremlin sentiments—has indicated the degree of pro-Ukraine support across the political spectrum.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!