首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 21 毫秒
1.
Network attacks, such as distributed denial of service (DDoS) and Internet worms, are highly distributed and well coordinated offensive assaults on services, hosts, and the infrastructure of the Internet, and can have disastrous effects including financial losses and disruption of essential services. Consequently, effective defensive countermeasures against these attacks must provide equally sophisticated and well coordinated mechanisms for monitoring, analysis, and response. In this paper, we investigate techniques for cooperative attack detection and countermeasures using decentralized information sharing. The key underlying idea is the use of epidemic algorithms to share attack information and achieve quasi-global knowledge about attack behaviors. This paper first presents a conceptual model that defines the relationships between the level of knowledge in the distributed system and the accuracy of attack detection. The design of a cooperative attack detection and defense framework is then presented, and its use for detecting and defending against DDoS attacks and Internet worms is described. Simulation results are presented to demonstrate the feasibility and effectiveness of the framework against these attacks.  相似文献   

2.
HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor. Recent phenomenon showed that legitimate traffic or flash crowds could have high-traffic flow characteristics as seen in DDoS attacks. In this paper, we demonstrate that legitimate HTTP/2 flash crowd traffic can be launched to cause denial of service. To the best of our knowledge, no previous study has been conducted to analyse the effect of both DDoS as well as flash crowd traffic against HTTP/2 services. Results obtained prove the effect of such attacks when tested under four varying protocol-dependant attack scenarios.  相似文献   

3.
Defending from DDoS attacks have become more difficult because they have evolved in many ways. Absence of a specific predetermined pattern, increase of number of attack devices, and distributed execution of the DDoS attack makes hard the recognition of the attack sources and thus application of countermeasures. When the DDoS attack is being executed, most of the cases, the target cannot provide its services normally; this is not a significant problem for non-critical application, but, for availability critical services such as stock financial, stock market, or governmental, the effect of the attack may involve huge damage. In this paper, we propose a DDoS avoidance strategy to provide service availability to those preregistered important users. In the proposed strategy, we divide the attack scenario in different time points and provide alternative access channels to already authenticated and other valid users.  相似文献   

4.
With the emergence of electronic commerce technology, marketers gained new methods for personalizing electronic advertisements, automating marketing research, and customizing product designs. These developments suggest that production operations also must be redesigned to support contemporary marketing objectives via mass customization. Yet, operations management research historically has focused on mass production systems buffering the customer from production operations. As such, the literature provides relatively few insights about managing mass customization operations. Thus, in this paper, we consider a previously unexamined type of mass customization production operations. The paper presents a case study of a manufacturer's videotape duplication and conversion system, consisting of a flexible network of heterogeneous, parallel machines used to duplicate and convert videotapes and other multimedia. We describe the characteristics of this flexible duplication system, discuss parallels between these systems and mass customization, and identify issues regarding flexibility, speed of delivery, and electronic service.  相似文献   

5.
Han X  Byrne P  Kahana M  Becker S 《PloS one》2012,7(5):e35940
We investigated how objects come to serve as landmarks in spatial memory, and more specifically how they form part of an allocentric cognitive map. Participants performing a virtual driving task incidentally learned the layout of a virtual town and locations of objects in that town. They were subsequently tested on their spatial and recognition memory for the objects. To assess whether the objects were encoded allocentrically we examined pointing consistency across tested viewpoints. In three experiments, we found that spatial memory for objects at navigationally relevant locations was more consistent across tested viewpoints, particularly when participants had more limited experience of the environment. When participants' attention was focused on the appearance of objects, the navigational relevance effect was eliminated, whereas when their attention was focused on objects' locations, this effect was enhanced, supporting the hypothesis that when objects are processed in the service of navigation, rather than merely being viewed as objects, they engage qualitatively distinct attentional systems and are incorporated into an allocentric spatial representation. The results are consistent with evidence from the neuroimaging literature that when objects are relevant to navigation, they not only engage the ventral "object processing stream", but also the dorsal stream and medial temporal lobe memory system classically associated with allocentric spatial memory.  相似文献   

6.
1. We review some of the classic literature on geomorphology and ecology of streams in an effort to examine how theoretical developments in these aquatic sciences have influenced the way fresh flowing waters are classified. Our aim was to provide a historical examination of conceptual developments related to fluvial classification, and to discuss implications for conservation planning and resource management. 2. Periods of conceptual influences can be separated into three overlapping phases each distinguished by theoretical, analytical or technological advances: (i) early Darwinian perspectives; (ii) the quantitative revolution; and, (iii) age of the computer, hierarchy and scale. 3. During the first phase, stream geomorphologists were largely influenced by Darwinian metaphors. The study of stream origin and change through time became more important than the study of stream systems themselves. The idea that streams progress deterministically through successive stages of development seemed to create a veil, most prevalently in North America, that barred analysis of the full scope of variability in these systems for over 50 years. 4. The quantitative revolution brought about many new ideas and developments, including the laws of stream numbers. This period focused on predictive and mechanistic explanations of stream processes, setting the stage for physically based stream classifications that assume that streams can be restored by engineering their physical characteristics. 5. In the most recent ‘age of the computer’, concepts from the fields of geographic information science and landscape ecology have been incorporated into stream ecology and aquatic classification. This has led to investigations in stream and aquatic ecosystems at hierarchical spatial scales and along different dimensions (upstream/downstream, riparian/floodplain, channel/ground water and through time). Yet, in contrast to terrestrial landscapes, flowing waters are not as easily classified into spatially nested hierarchical regions wherein upper levels can be subdivided into smaller and smaller regions at finer spatial scales. Riverscapes are perhaps best described as directionally nested hierarchies: aquatic elements further downstream cannot be rendered equivalently to elements upstream. Moreover, fully integrated aquatic ecosystem classifications that incorporate lake and river networks, wetlands, groundwater reservoirs and upland areas are exceedingly rare. 6. We reason that the way forward for classification of flowing waters is to account for the directionally nested nature of these networks and to encode flexibility into modern digital freshwater inventories and fluvial classification models.  相似文献   

7.
The platypus (Ornithorhynchus anatinus), like many other stream‐dependent species, is reportedly sensitive to catchment urbanization. However, the primary mechanism limiting its distribution in urban environments has not been identified. We created species distribution models for three platypus demographic classes: adult females (which are exclusively responsible for raising young), adult males (which are more mobile than females), and first‐year juveniles. Using live‐trapping data collected in Melbourne, Australia, we tested whether distributions of the three demographic classes were better predicted by catchment urban density (total imperviousness), by urban stormwater runoff (catchment attenuated imperviousness), or by stream size (catchment area). Two variants of each predictor variable were developed, one that accounted for platypus mobility, and one that did not. Female distribution was most plausibly predicted by stormwater runoff (accounting for mobility), with a steep decline in reporting rate from 0 to 10% attenuated imperviousness. Male distribution was equally plausibly predicted by stormwater runoff and urban density (both accounting for mobility), with a less steep and more uncertain decline with imperviousness than females. Juvenile distribution was most plausibly predicted by stream size (accounting for mobility), but both stormwater runoff and urban density (accounting for mobility) were nearly equally plausible predictors. The superior performance of models that accounted for mobility underscores the importance of accounting for this in species distribution models of highly mobile species. Platypus populations in urban areas are likely to be affected adversely by urban stormwater runoff conveyed by conventional drainage systems, with adult females more limited by runoff‐related impacts than adult males or juveniles. Urban platypus conservation efforts have generally focused on restoring riparian and in‐stream habitats on a local scale. This is unlikely to protect platypus from adverse impacts of urban stormwater runoff, which is most effectively managed at the catchment scale.  相似文献   

8.
High-throughput systems allow screening and analysis of large number of samples simultaneously under same conditions. Over recent years, high-throughput systems have found applications in fields other than drug discovery like bioprocess industries, pollutant detection, material microarrays, etc. With the introduction of materials in such HT platforms, the screening system has been enabled for solid phases apart from conventional solution phase. The use of biomaterials has further facilitated cell-based assays in such platforms. Here, the authors have focused on the recent developments in biomaterial-based platforms including the fabricationusing contact and non-contact methods and utilization of such platforms for discovery of novel biomaterials exploiting interaction of biological entities with surface and bulk properties. Finally, the authors have elaborated on the application of the biomaterial-based high-throughput platforms in tissue engineering and regenerative medicine, cancer and stem cell studies. The studies show encouraging applications of biomaterial microarrays. However, success in clinical applicability still seems to be a far off task majorly due to absence of robust characterization and analysis techniques. Extensive focus is required for developing personalized medicine, analytical tools and storage/shelf-life of cell laden microarrays.  相似文献   

9.
Virtual machines (VM) migration can improve availability, manageability, performance and fault tolerance of systems. Current migration researches mainly focus on the promotion of the efficiency by using shared storage, priority-based policy etc.. But the effect of migration is not well concerned. In fact, once physical servers are overloaded from denial-of-service attack (DDoS) attack, a hasty migration operation not only unable to alleviate the harm of the attack, but also increases the harmfulness. In this paper, a novel DDoS attack, Cloud-Droplet-Freezing (CDF) attack, is described according to the characteristics of cloud computing cluster. Our experiments show that such attack is able to congest internal network communication of cloud server cluster, whilst consume resources of physical server. Base on the analysis of CDF attack, we highlight the method of evaluating potential threats hidden behind the normal VM migration and analyze the flaws of existing intrusion detection systems/prevention system for defensing the CDF attack.  相似文献   

10.
The accuracy of current signal peptide predictors is outstanding. The most successful predictors are based on neural networks and hidden Markov models, reaching a sensitivity of 99% and an accuracy of 95%. Here, we demonstrate that the popular BLASTP alignment tool can be tuned for signal peptide prediction reaching the same high level of prediction success. Alignment-based techniques provide additional benefits. In spite of high success rates signal peptide predictors yield false predictions. Simple sequences like polyvaline, for example, are predicted as signal peptides. The general architecture of learning systems makes it difficult to trace the cause of such problems. This kind of false predictions can be recognized or avoided altogether by using sequence comparison techniques. Based on these results we have implemented a public web service, called Signal-BLAST. Predictions returned by Signal-BLAST are transparent and easy to analyze. AVAILABILITY: Signal-BLAST is available online at http://sigpep.services.came.sbg.ac.at/signalblast.html.  相似文献   

11.
There is considerable interest in comparative research on different species’ abilities to respond to human communicative cues such as gaze and pointing. It has been reported that some canines perform significantly better than monkeys and apes on tasks requiring the comprehension of either declarative or imperative pointing and these differences have been attributed to domestication in dogs. Here we tested a sample of chimpanzees on a task requiring comprehension of an imperative request and show that, though there are considerable individual differences, the performance by the apes rival those reported in pet dogs. We suggest that small differences in methodology can have a pronounced influence on performance on these types of tasks. We further suggest that basic differences in subject sampling, subject recruitment and rearing experiences have resulted in a skewed representation of canine abilities compared to those of monkeys and apes.  相似文献   

12.
Global climate change is predicted to increase air and stream temperatures and alter thermal habitat suitability for growth and survival of coldwater fishes, including brook charr (Salvelinus fontinalis), brown trout (Salmo trutta), and rainbow trout (Oncorhynchus mykiss). In a changing climate, accurate stream temperature modeling is increasingly important for sustainable salmonid management throughout the world. However, finite resource availability (e.g. funding, personnel) drives a tradeoff between thermal model accuracy and efficiency (i.e. cost-effective applicability at management-relevant spatial extents). Using different projected climate change scenarios, we compared the accuracy and efficiency of stream-specific and generalized (i.e. region-specific) temperature models for coldwater salmonids within and outside the State of Michigan, USA, a region with long-term stream temperature data and productive coldwater fisheries. Projected stream temperature warming between 2016 and 2056 ranged from 0.1 to 3.8 °C in groundwater-dominated streams and 0.2–6.8 °C in surface-runoff dominated systems in the State of Michigan. Despite their generally lower accuracy in predicting exact stream temperatures, generalized models accurately projected salmonid thermal habitat suitability in 82% of groundwater-dominated streams, including those with brook charr (80% accuracy), brown trout (89% accuracy), and rainbow trout (75% accuracy). In contrast, generalized models predicted thermal habitat suitability in runoff-dominated streams with much lower accuracy (54%). These results suggest that, amidst climate change and constraints in resource availability, generalized models are appropriate to forecast thermal conditions in groundwater-dominated streams within and outside Michigan and inform regional-level salmonid management strategies that are practical for coldwater fisheries managers, policy makers, and the public. We recommend fisheries professionals reserve resource-intensive stream-specific models for runoff-dominated systems containing high-priority fisheries resources (e.g. trophy individuals, endangered species) that will be directly impacted by projected stream warming.  相似文献   

13.
生态系统服务建模技术研究进展   总被引:5,自引:4,他引:1  
李婷  吕一河 《生态学报》2018,38(15):5287-5296
在生态系统服务评估模型的数量、类型及应用大量增加的背景下,为将生态系统服务评估有效整合到决策中,系统比较、甄别不同建模工具并筛选出适合决策需求的生态系统服务评估和模拟方法尤为必要。因此,归纳并总结了国内外现有的生态系统服务评估模型的建模技术,包括:相关关系法、生物-物理过程法以及专家知识法;分别对其原理、差异、优缺点以及适用性进行了详尽阐释。大多数相关模型侧重于统计关系,相对容易创建和扩展,适用于生态系统服务的初始评估;生物-物理过程模型难以构建且不易获取,但提供了探索人-地系统相互作用和长期变化的有效机制;专家知识法有效结合了多种类型的知识体系,关注人类社会与自然系统之间反馈和交互动态的系统整合,但当评估地点发生变化时难以验证。在此基础上,介绍了基于上述3种建模技术的典型生态系统服务综合评估模型的发展和应用现状。各类建模技术面临着实用性和科学准确性之间的权衡。通过对不同建模技术的梳理与整合分析旨在提升当前生态系统服务研究的决策支撑能力,并为国内相关研究提供参考和借鉴。  相似文献   

14.
Action recognition has become a hot topic within computer vision. However, the action recognition community has focused mainly on relatively simple actions like clapping, walking, jogging, etc. The detection of specific events with direct practical use such as fights or in general aggressive behavior has been comparatively less studied. Such capability may be extremely useful in some video surveillance scenarios like prisons, psychiatric centers or even embedded in camera phones. As a consequence, there is growing interest in developing violence detection algorithms. Recent work considered the well-known Bag-of-Words framework for the specific problem of fight detection. Under this framework, spatio-temporal features are extracted from the video sequences and used for classification. Despite encouraging results in which high accuracy rates were achieved, the computational cost of extracting such features is prohibitive for practical applications. This work proposes a novel method to detect violence sequences. Features extracted from motion blobs are used to discriminate fight and non-fight sequences. Although the method is outperformed in accuracy by state of the art, it has a significantly faster computation time thus making it amenable for real-time applications.  相似文献   

15.
The conventional optical microscope has been the primary tool in assisting pathological examinations. The modern digital pathology combines the power of microscopy, electronic detection, and computerized analysis. It enables cellular-, molecular-, and genetic-imaging at high efficiency and accuracy to facilitate clinical screening and diagnosis. This paper first reviews the fundamental concepts of microscopic imaging and introduces the technical features and associated clinical applications of optical microscopes, electron microscopes, scanning tunnel microscopes, and fluorescence microscopes. The interface of microscopy with digital image acquisition methods is discussed. The recent developments and future perspectives of contemporary microscopic imaging techniques such as three-dimensional and in vivo imaging are analyzed for their clinical potentials.  相似文献   

16.
Panic disorder (PD) is a subtype of anxiety disorder in which the core phenomenon is the spontaneous occurrence of panic attacks. Although studies with laboratory animals have been instrumental for the understanding of its neurobiology and treatment, few review articles have focused on the validity of the currently used animal models for studying this psychopathology. Therefore, the aim of the present paper is to discuss the strengths and limits of these models in terms of face, construct and predictive validity. Based on the hypothesis that panic attacks are related to defensive responses elicited by proximal threat, most animal models measure the escape responses induced by specific stimuli. Some apply electrical or chemical stimulation to brain regions proposed to modulate fear and panic responses, such as the dorsal periaqueductal grey or the medial hypothalamus. Other models focus on the behavioural consequences caused by the exposure of rodents to ultrasound or natural predators. Finally, the elevated T-maze associates a one-way escape response from an open arm with panic attacks. Despite some limitations, animal models are essential for a better understanding of the neurobiology and pharmacology of PD and for discovering more effective treatments.  相似文献   

17.
Business-process reengineering (BPR), like computer information systems development (ISD), deals primarily with process and contains only weak facilities for addressing structure and culture. Manufacturing and ISD have strong roots in the functionalist traditions of natural science, and in a cultural environment their engineering stance deals poorly with obstacles to change. While the structured, or “hard,” engineering approaches have given rise to successful developments, they have not always proved effective. In ISD, the hard engineering methods have a tendency to redefine information systems problems as problems of technical development, and similarly in engineering contexts, BPR risks becoming too focused on technical processes. However, failure to gain commitment and a sense of ownership in new processes is a cause of failure in both BPR and ISD. This article explores a case study where both technical and human issues must be addressed—the extension of student record processing within a university. In this study, the BPR requirement is seen to arise from the users of the information system rather than as an imposed managerial imperative. The use of total systems intervention (TSI) and interactive planning (IP) enabled the immediate technical problems to be separated from underlying BPR requirements and from the need to gain commitment to change. Thus, unnecessary technical effort and the risks of failure from resistance to change were avoided. From the findings of this intervention, it is argued that the wider application of TSI provides a framework within which managerially perceived needs can be translated into a grassroots commitment.  相似文献   

18.
Recent developments in implicit solvent models may be compared in terms of accuracy and computational efficiency. Based on improvements in the accuracy of generalized Born methods and the speed of Poisson-Boltzmann solvers, it appears that the two techniques are converging to a point at which both will be suitable for simulating certain types of biomolecular systems over sizable time and length scales.  相似文献   

19.
For a long time, targeted and discovery proteomics covered different corners of the detection spectrum, with targeted proteomics focused on small target sets. This changed with the recent advances in highly multiplexed analysis. While discovery proteomics still pushes higher numbers of identified and quantified proteins, the advances in targeted proteomics rose to cover large parts of less complex proteomes or proteomes with low protein detection counts due to dynamic range restrictions, like the blood proteome. These new developments will impact, especially on the field of biomarker discovery and the possibility of using targeted proteomics for diagnostic purposes.  相似文献   

20.
Species distribution models are widely used for stream bioassessment, estimating changes in habitat suitability and identifying conservation priorities. We tested the accuracy of three modelling strategies (single species ensemble, multi-species response and community classification models) to predict fish assemblages at reference stream segments in coastal subtropical Australia. We aimed to evaluate each modelling strategy for consistency of predictor variable selection; determine which strategy is most suitable for stream bioassessment using fish indicators; and appraise which strategies best match other stream management applications. Five models, one single species ensemble, two multi-species response and two community classification models, were calibrated using fish species presence-absence data from 103 reference sites. Models were evaluated for generality and transferability through space and time using four external reference site datasets. Elevation and catchment slope were consistently identified as key correlates of fish assemblage composition among models. The community classification models had high omission error rates and contributed fewer taxa to the ‘expected’ component of the taxonomic completeness (O/E50) index than the other strategies. This potentially decreases the model sensitivity for site impact assessment. The ensemble model accurately and precisely modelled O/E50 for the training data, but produced biased predictions for the external datasets. The multi-species response models afforded relatively high accuracy and precision coupled with low bias across external datasets and had lower taxa omission rates than the community classification models. They inherently included rare, but predictable species while excluding species that were poorly modelled among all strategies. We suggest that the multi-species response modelling strategy is most suited to bioassessment using freshwater fish assemblages in our study area. At the species level, the ensemble model exhibited high sensitivity without reductions in specificity, relative to the other models. We suggest that this strategy is well suited to other non-bioassessment stream management applications, e.g., identifying priority areas for species conservation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号