Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic feat...A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic features. The processes and rules of building CPN based attack model from attack tree are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CPN based attack modeling. This extended model is useful in intrusion detection and risk evaluation. Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions, such as intrusion response and intrusion defense. A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn’t.展开更多
This paper presents the nonlinear electromagneto-mechanical behavior of magnetostrictive/piezoelectric laminates under three-point bending both numerically and experimentally.The laminates are fabricated using thin Te...This paper presents the nonlinear electromagneto-mechanical behavior of magnetostrictive/piezoelectric laminates under three-point bending both numerically and experimentally.The laminates are fabricated using thin Terfenol-D and PZT layers.The three-point bending test was conducted on the Terfenol-D/PZT laminates,and the displacement,induced magnetic field and induced voltage due to mechanical loads were measured.Three-dimensional finite element analysis was also carried out,and the electromagneto-mechanical fields in the laminates were predicted by introducing a second-order magnetoelastic constant for Terfenol-D.Comparison was then made between simulation and experiment.展开更多
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
基金Supperted by the Nation High Technology Research and Development Program of China (863 Program) (No.2002AA001042) and the Tackle Key Problem Program of Sichuan Province (No. 01GG0712)
文摘A color petri net (CPN) based attack modeling approach is addressed. Compared with graph-based modeling, CPN based attack model is flexible enough to model Internet intrusions, because of their static and dynamic features. The processes and rules of building CPN based attack model from attack tree are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CPN based attack modeling. This extended model is useful in intrusion detection and risk evaluation. Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions, such as intrusion response and intrusion defense. A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn’t.
基金supported by Grant-in-Aid for JSPS Fellows(22·3402).
文摘This paper presents the nonlinear electromagneto-mechanical behavior of magnetostrictive/piezoelectric laminates under three-point bending both numerically and experimentally.The laminates are fabricated using thin Terfenol-D and PZT layers.The three-point bending test was conducted on the Terfenol-D/PZT laminates,and the displacement,induced magnetic field and induced voltage due to mechanical loads were measured.Three-dimensional finite element analysis was also carried out,and the electromagneto-mechanical fields in the laminates were predicted by introducing a second-order magnetoelastic constant for Terfenol-D.Comparison was then made between simulation and experiment.