The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex...The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks.This is primarily due to the sophistication of the attacks and the availability of powerful tools.Interconnected devices such as the Internet of Things(IoT)are also increasing attack exposures due to the increase in vulnerabilities.Over the last few years,we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks.Edge technology brings processing power closer to the network and brings many advantages,including reduced latency,while it can also introduce vulnerabilities that could be exploited.Smart cities are also dependent on technologies where everything is interconnected.This interconnectivity makes them highly vulnerable to cyber-attacks,especially by the Advanced Persistent Threat(APT),as these vulnerabilities are amplified by the need to integrate new technologies with legacy systems.Cybercriminals behind APT attacks have recently been targeting the IoT ecosystems,prevalent in many of these cities.In this paper,we used a publicly available dataset on Advanced Persistent Threats(APT)and developed a data-driven approach for detecting APT stages using the Cyber Kill Chain.APTs are highly sophisticated and targeted forms of attacks that can evade intrusion detection systems,resulting in one of the greatest current challenges facing security professionals.In this experiment,we used multiple machine learning classifiers,such as Naïve Bayes,Bayes Net,KNN,Random Forest and Support Vector Machine(SVM).We used Weka performance metrics to show the numeric results.The best performance result of 91.1%was obtained with the Naïve Bayes classifier.We hope our proposed solution will help security professionals to deal with APTs in a timely and effective manner.展开更多
A specific cytotoxic agent against gastric cancer was constructed by covalently coupling the ricin A chain to monoclonal artibody, MGb2. MGb2 was modified by SPDP to introduce the 3-(2-pyridylthio) propionyl radical a...A specific cytotoxic agent against gastric cancer was constructed by covalently coupling the ricin A chain to monoclonal artibody, MGb2. MGb2 was modified by SPDP to introduce the 3-(2-pyridylthio) propionyl radical and then treated with a reduced A chain to give a disulfide linked conjugate that retained the original binding specificity of the antibody moiety. The conjugate obtained retained the activity of the antibody and the biological activity of the A chain well.展开更多
美国海军一体化防空火控系统(Naval Integrated Fire Control-Counter Air,NIFC-CA)是一种分布式、网络化的编队防空反导指挥控制系统,其目的是实现超视距远程拦截。随着美军“分布式杀伤”作战思想的不断深入,NIFC-CA能力建设也随之不...美国海军一体化防空火控系统(Naval Integrated Fire Control-Counter Air,NIFC-CA)是一种分布式、网络化的编队防空反导指挥控制系统,其目的是实现超视距远程拦截。随着美军“分布式杀伤”作战思想的不断深入,NIFC-CA能力建设也随之不断完善发展。本文首先对NIFC-CA系统的概念、背景及意义进行深入分析;在此基础上,研究美国海军NIFC-CA系统的作战运用样式;最后,从扩展性、全域性、感知性3个方面,对我军一体化防空提出一些发展建议,为我军海上一体化协同防空作战提供借鉴意义。展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
基金supported in part by the School of Computing and Digital Technology at Birmingham City UniversityThe work of M.A.Rahman was supported in part by the Flagship Grant RDU190374.
文摘The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks.This is primarily due to the sophistication of the attacks and the availability of powerful tools.Interconnected devices such as the Internet of Things(IoT)are also increasing attack exposures due to the increase in vulnerabilities.Over the last few years,we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks.Edge technology brings processing power closer to the network and brings many advantages,including reduced latency,while it can also introduce vulnerabilities that could be exploited.Smart cities are also dependent on technologies where everything is interconnected.This interconnectivity makes them highly vulnerable to cyber-attacks,especially by the Advanced Persistent Threat(APT),as these vulnerabilities are amplified by the need to integrate new technologies with legacy systems.Cybercriminals behind APT attacks have recently been targeting the IoT ecosystems,prevalent in many of these cities.In this paper,we used a publicly available dataset on Advanced Persistent Threats(APT)and developed a data-driven approach for detecting APT stages using the Cyber Kill Chain.APTs are highly sophisticated and targeted forms of attacks that can evade intrusion detection systems,resulting in one of the greatest current challenges facing security professionals.In this experiment,we used multiple machine learning classifiers,such as Naïve Bayes,Bayes Net,KNN,Random Forest and Support Vector Machine(SVM).We used Weka performance metrics to show the numeric results.The best performance result of 91.1%was obtained with the Naïve Bayes classifier.We hope our proposed solution will help security professionals to deal with APTs in a timely and effective manner.
文摘A specific cytotoxic agent against gastric cancer was constructed by covalently coupling the ricin A chain to monoclonal artibody, MGb2. MGb2 was modified by SPDP to introduce the 3-(2-pyridylthio) propionyl radical and then treated with a reduced A chain to give a disulfide linked conjugate that retained the original binding specificity of the antibody moiety. The conjugate obtained retained the activity of the antibody and the biological activity of the A chain well.
文摘美国海军一体化防空火控系统(Naval Integrated Fire Control-Counter Air,NIFC-CA)是一种分布式、网络化的编队防空反导指挥控制系统,其目的是实现超视距远程拦截。随着美军“分布式杀伤”作战思想的不断深入,NIFC-CA能力建设也随之不断完善发展。本文首先对NIFC-CA系统的概念、背景及意义进行深入分析;在此基础上,研究美国海军NIFC-CA系统的作战运用样式;最后,从扩展性、全域性、感知性3个方面,对我军一体化防空提出一些发展建议,为我军海上一体化协同防空作战提供借鉴意义。
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.