CINXE.COM

Search results for: sink-hole attack

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: sink-hole attack</title> <meta name="description" content="Search results for: sink-hole attack"> <meta name="keywords" content="sink-hole attack"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="sink-hole attack" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="sink-hole attack"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 629</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: sink-hole attack</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">629</span> Mechanism of Sinkhole Development on Water-Bearing Soft Ground Tunneling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20J.%20Kim">H. J. Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20H.%20Kim"> K. H. Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20H.%20Park"> N. H. Park</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20T.%20Nam"> K. T. Nam</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20H.%20Jung"> Y. H. Jung</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20H.%20Kim"> T. H. Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20H.%20Shin"> J. H. Shin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Underground excavations in an urban area can cause various geotechnical problems such as ground loss and lowering of groundwater level. When the ground loss becomes uncontrollably large, sinkholes can be developed to the ground surface. A sinkhole is commonly known as the natural phenomenon associated with lime rock areas. However, sinkholes in urban areas due to pressurized sewers and/or tunneling are also frequently reported. In this study, mechanism of a sinkhole developed at the site ‘A’ where a tunneling work underwent is investigated. The sinkhole occurred in the sand strata with the high level of groundwater when excavating a tunnel of which diameter is 3.6 m. The sinkhole was progressed in two steps. The first step began with the local failure around the tunnel face followed by tons of groundwater inflow, and the second step was triggered by the TBM (Tunnel Boring Machine) chamber opening which led to the progressive general failure. The possibility of the sinkhole was evaluated by using Limit Equilibrium Method (LEM), and critical height was evaluated by the empirical stability chart. It is found that the lowering of the face pressure and inflow of groundwater into the tunnel face turned to be the main reason for the sinkhole. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=limit%20equilibrium%20method" title="limit equilibrium method">limit equilibrium method</a>, <a href="https://publications.waset.org/abstracts/search?q=sinkhole" title=" sinkhole"> sinkhole</a>, <a href="https://publications.waset.org/abstracts/search?q=stability%20chart" title=" stability chart"> stability chart</a>, <a href="https://publications.waset.org/abstracts/search?q=tunneling" title=" tunneling"> tunneling</a> </p> <a href="https://publications.waset.org/abstracts/77044/mechanism-of-sinkhole-development-on-water-bearing-soft-ground-tunneling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77044.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">628</span> Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebrahim%20Alrashed">Ebrahim Alrashed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy-aware%20routing" title="energy-aware routing">energy-aware routing</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack" title=" sink-hole attack"> sink-hole attack</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a> </p> <a href="https://publications.waset.org/abstracts/71964/reliable-and-energy-aware-data-forwarding-under-sink-hole-attack-in-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71964.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">627</span> Geospatial Analysis for Predicting Sinkhole Susceptibility in Greene County, Missouri</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shishay%20Kidanu">Shishay Kidanu</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Alhaj"> Abdullah Alhaj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sinkholes in the karst terrain of Greene County, Missouri, pose significant geohazards, imposing challenges on construction and infrastructure development, with potential threats to lives and property. To address these issues, understanding the influencing factors and modeling sinkhole susceptibility is crucial for effective mitigation through strategic changes in land use planning and practices. This study utilizes geographic information system (GIS) software to collect and process diverse data, including topographic, geologic, hydrogeologic, and anthropogenic information. Nine key sinkhole influencing factors, ranging from slope characteristics to proximity to geological structures, were carefully analyzed. The Frequency Ratio method establishes relationships between attribute classes of these factors and sinkhole events, deriving class weights to indicate their relative importance. Weighted integration of these factors is accomplished using the Analytic Hierarchy Process (AHP) and the Weighted Linear Combination (WLC) method in a GIS environment, resulting in a comprehensive sinkhole susceptibility index (SSI) model for the study area. Employing Jenk's natural break classifier method, the SSI values are categorized into five distinct sinkhole susceptibility zones: very low, low, moderate, high, and very high. Validation of the model, conducted through the Area Under Curve (AUC) and Sinkhole Density Index (SDI) methods, demonstrates a robust correlation with sinkhole inventory data. The prediction rate curve yields an AUC value of 74%, indicating a 74% validation accuracy. The SDI result further supports the success of the sinkhole susceptibility model. This model offers reliable predictions for the future distribution of sinkholes, providing valuable insights for planners and engineers in the formulation of development plans and land-use strategies. Its application extends to enhancing preparedness and minimizing the impact of sinkhole-related geohazards on both infrastructure and the community. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sinkhole" title="sinkhole">sinkhole</a>, <a href="https://publications.waset.org/abstracts/search?q=GIS" title=" GIS"> GIS</a>, <a href="https://publications.waset.org/abstracts/search?q=analytical%20hierarchy%20process" title=" analytical hierarchy process"> analytical hierarchy process</a>, <a href="https://publications.waset.org/abstracts/search?q=frequency%20ratio" title=" frequency ratio"> frequency ratio</a>, <a href="https://publications.waset.org/abstracts/search?q=susceptibility" title=" susceptibility"> susceptibility</a>, <a href="https://publications.waset.org/abstracts/search?q=Missouri" title=" Missouri"> Missouri</a> </p> <a href="https://publications.waset.org/abstracts/176373/geospatial-analysis-for-predicting-sinkhole-susceptibility-in-greene-county-missouri" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176373.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">74</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">626</span> Application of Electrical Resistivity Tomography to Image the Subsurface Structure of a Sinkhole, a Case Study in Southwestern Missouri</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shishay%20T.%20Kidanu">Shishay T. Kidanu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study area is located in Southwestern Missouri and is mainly underlain by Mississippian Age limestone which is highly susceptible to karst processes. The area is known for the presence of various karst features like caves, springs and more importantly Sinkholes. Sinkholes are one of the most common karst features and the primary hazard in karst areas. Investigating the subsurface structure and development mechanism of existing sinkholes enables to understand their long-term impact and chance of reactivation and also helps to provide effective mitigation measures. In this study ERT (Electrical Resistivity Tomography), MASW (Multichannel Analysis of Surface Waves) and borehole control data have been used to image the subsurface structure and investigate the development mechanism of a sinkhole in Southwestern Missouri. The study shows that the main process responsible for the development of the sinkhole is the downward piping of fine grained soils. Furthermore, the study reveals that the sinkhole developed along a north-south oriented vertical joint set characterized by a vertical zone of water seepage and associated fine grained soil piping into preexisting fractures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ERT" title="ERT">ERT</a>, <a href="https://publications.waset.org/abstracts/search?q=Karst" title=" Karst"> Karst</a>, <a href="https://publications.waset.org/abstracts/search?q=MASW" title=" MASW"> MASW</a>, <a href="https://publications.waset.org/abstracts/search?q=sinkhole" title=" sinkhole"> sinkhole</a> </p> <a href="https://publications.waset.org/abstracts/55922/application-of-electrical-resistivity-tomography-to-image-the-subsurface-structure-of-a-sinkhole-a-case-study-in-southwestern-missouri" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55922.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">625</span> Integrated Geophysical Surveys for Sinkhole and Subsidence Vulnerability Assessment, in the West Rand Area of Johannesburg</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ramoshweu%20Melvin%20Sethobya">Ramoshweu Melvin Sethobya</a>, <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20Chirenje"> Emmanuel Chirenje</a>, <a href="https://publications.waset.org/abstracts/search?q=Mihlali%20Hobo"> Mihlali Hobo</a>, <a href="https://publications.waset.org/abstracts/search?q=Simon%20Sebothoma"> Simon Sebothoma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The recent surge in residential infrastructure development around the metropolitan areas of South Africa has necessitated conditions for thorough geotechnical assessments to be conducted prior to site developments to ensure human and infrastructure safety. This paper appraises the success in the application of multi-method geophysical techniques for the delineation of sinkhole vulnerability in a residential landscape. Geophysical techniques ERT, MASW, VES, Magnetics and gravity surveys were conducted to assist in mapping sinkhole vulnerability, using an existing sinkhole as a constraint at Venterspost town, West of Johannesburg city. A combination of different geophysical techniques and results integration from those proved to be useful in the delineation of the lithologic succession around sinkhole locality, and determining the geotechnical characteristics of each layer for its contribution to the development of sinkholes, subsidence and cavities at the vicinity of the site. Study results have also assisted in the determination of the possible depth extension of the currently existing sinkhole and the location of sites where other similar karstic features and sinkholes could form. Results of the ERT, VES and MASW surveys have uncovered dolomitic bedrock at varying depths around the sites, which exhibits high resistivity values in the range 2500-8000ohm.m and corresponding high velocities in the range 1000-2400 m/s. The dolomite layer was found to be overlain by a weathered chert-poor dolomite layer, which has resistivities between the range 250-2400ohm.m, and velocities ranging from 500-600m/s, from which the large sinkhole has been found to collapse/ cave in. A compiled 2.5D high resolution Shear Wave Velocity (Vs) map of the study area was created using 2D profiles of MASW data, offering insights into the prevailing lithological setup conducive for formation various types of karstic features around the site. 3D magnetic models of the site highlighted the regions of possible subsurface interconnections between the currently existing large sinkhole and the other subsidence feature at the site. A number of depth slices were used to detail the conditions near the sinkhole as depth increases. Gravity surveys results mapped the possible formational pathways for development of new karstic features around the site. Combination and correlation of different geophysical techniques proved useful in delineation of the site geotechnical characteristics and mapping the possible depth extend of the currently existing sinkhole. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=resistivity" title="resistivity">resistivity</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetics" title=" magnetics"> magnetics</a>, <a href="https://publications.waset.org/abstracts/search?q=sinkhole" title=" sinkhole"> sinkhole</a>, <a href="https://publications.waset.org/abstracts/search?q=gravity" title=" gravity"> gravity</a>, <a href="https://publications.waset.org/abstracts/search?q=karst" title=" karst"> karst</a>, <a href="https://publications.waset.org/abstracts/search?q=delineation" title=" delineation"> delineation</a>, <a href="https://publications.waset.org/abstracts/search?q=VES" title=" VES"> VES</a> </p> <a href="https://publications.waset.org/abstracts/170792/integrated-geophysical-surveys-for-sinkhole-and-subsidence-vulnerability-assessment-in-the-west-rand-area-of-johannesburg" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170792.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">80</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">624</span> Array Type Miniaturized Ultrasonic Sensors for Detecting Sinkhole in the City</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Won%20Young%20Choi">Won Young Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Kwan%20Kyu%20Park"> Kwan Kyu Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, the road depression happening in the urban area is different from the cause of the sink hole and the generation mechanism occurring in the limestone area. The main cause of sinkholes occurring in the city center is the loss of soil due to the damage of old underground buried materials and groundwater discharge due to large underground excavation works. The method of detecting the sinkhole in the urban area is mostly using the Ground Penetration Radar (GPR). However, it is challenging to implement compact system and detecting watery state since it is based on electromagnetic waves. Although many ultrasonic underground detection studies have been conducted, near-ground detection (several tens of cm to several meters) has been developed for bulk systems using geophones as a receiver. The goal of this work is to fabricate a miniaturized sinkhole detecting system based on low-cost ultrasonic transducers of 40 kHz resonant frequency with high transmission pressure and receiving sensitivity. Motived by biomedical ultrasonic imaging methods, we detect air layers below the ground such as asphalt through the pulse-echo method. To improve image quality using multi-channel, linear array system is implemented, and image is acquired by classical synthetic aperture imaging method. We present the successful feasibility test of multi-channel sinkhole detector based on ultrasonic transducer. In this work, we presented and analyzed image results which are imaged by single channel pulse-echo imaging, synthetic aperture imaging. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=road%20depression" title="road depression">road depression</a>, <a href="https://publications.waset.org/abstracts/search?q=sinkhole" title=" sinkhole"> sinkhole</a>, <a href="https://publications.waset.org/abstracts/search?q=synthetic%20aperture%20imaging" title=" synthetic aperture imaging"> synthetic aperture imaging</a>, <a href="https://publications.waset.org/abstracts/search?q=ultrasonic%20transducer" title=" ultrasonic transducer"> ultrasonic transducer</a> </p> <a href="https://publications.waset.org/abstracts/88771/array-type-miniaturized-ultrasonic-sensors-for-detecting-sinkhole-in-the-city" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">144</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">623</span> Study on Monitoring Techniques Developed for a City Railway Construction </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Myoung-Jin%20Lee">Myoung-Jin Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Sung-Jin%20Lee"> Sung-Jin Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Young-Kon%20Park"> Young-Kon Park</a>, <a href="https://publications.waset.org/abstracts/search?q=Jin-Wook%20Kim"> Jin-Wook Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Bo-Kyoung%20Kim"> Bo-Kyoung Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Song-Hun%20Chong"> Song-Hun Chong</a>, <a href="https://publications.waset.org/abstracts/search?q=Sun-Il%20Kim"> Sun-Il Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Currently, sinkholes may occur due to natural or unknown causes. When the sinkhole is an instantaneous phenomenon, most accidents occur because of significant damage. Thus, methods of monitoring are being actively researched, such that the impact of the accident can be mitigated. A sinkhole can severely affect and wreak havoc in community-based facilities such as a city railway construction. Therefore, the development of a laser / scanning system and an image-based tunnel is one method of pre-monitoring that it stops the accidents. The laser scanning is being used but this has shortcomings as it involves the development of expensive equipment. A laser / videobased scanning tunnel is being developed at Korea Railroad Research Institute. This is designed to automatically operate the railway. The purpose of the scanning is to obtain an image of the city such as of railway structures (stations, tunnel). At the railway structures, it has developed 3D laser scanning that can find a micro-crack can not be distinguished by the eye. An additional aim is to develop technology to monitor the status of the railway structure without the need for expensive post-processing of 3D laser scanning equipment, by developing corresponding software. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=3D%20laser%20scanning" title="3D laser scanning">3D laser scanning</a>, <a href="https://publications.waset.org/abstracts/search?q=sinkhole" title=" sinkhole"> sinkhole</a>, <a href="https://publications.waset.org/abstracts/search?q=tunnel" title=" tunnel"> tunnel</a>, <a href="https://publications.waset.org/abstracts/search?q=city%20railway%20construction" title=" city railway construction"> city railway construction</a> </p> <a href="https://publications.waset.org/abstracts/47849/study-on-monitoring-techniques-developed-for-a-city-railway-construction" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47849.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">435</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">622</span> A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Qiang">Li Qiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Ze-Ming"> Yang Ze-Ming</a>, <a href="https://publications.waset.org/abstracts/search?q=Liu%20Bao-Xu"> Liu Bao-Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiang%20Zheng-Wei"> Jiang Zheng-Wei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reasoning" title="reasoning">reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20networks" title=" Bayesian networks"> Bayesian networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attack%20attribution" title=" cyber-attack attribution"> cyber-attack attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=Kill%20Chain" title=" Kill Chain"> Kill Chain</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20intelligence" title=" threat intelligence"> threat intelligence</a> </p> <a href="https://publications.waset.org/abstracts/50175/a-reasoning-method-of-cyber-attack-attribution-based-on-threat-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">450</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">621</span> Mathematical Based Forecasting of Heart Attack</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Razieh%20Khalafi">Razieh Khalafi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Myocardial infarction (MI) or acute myocardial infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analyzing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behavior of these signals were checked. Results shows this methodology can forecast the ECG and accordingly heart attack with high accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heart%20attack" title="heart attack">heart attack</a>, <a href="https://publications.waset.org/abstracts/search?q=ECG" title=" ECG"> ECG</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20walk" title=" random walk"> random walk</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation%20dimension" title=" correlation dimension"> correlation dimension</a>, <a href="https://publications.waset.org/abstracts/search?q=forecasting" title=" forecasting"> forecasting</a> </p> <a href="https://publications.waset.org/abstracts/29782/mathematical-based-forecasting-of-heart-attack" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29782.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">541</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">620</span> A New Mathematical Method for Heart Attack Forecasting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Razi%20Khalafi">Razi Khalafi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Myocardial Infarction (MI) or acute Myocardial Infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analysing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behaviour of these signals were checked. Results show this methodology can forecast the ECG and accordingly heart attack with high accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heart%20attack" title="heart attack">heart attack</a>, <a href="https://publications.waset.org/abstracts/search?q=ECG" title=" ECG"> ECG</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20walk" title=" random walk"> random walk</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation%20dimension" title=" correlation dimension"> correlation dimension</a>, <a href="https://publications.waset.org/abstracts/search?q=forecasting" title=" forecasting"> forecasting</a> </p> <a href="https://publications.waset.org/abstracts/30802/a-new-mathematical-method-for-heart-attack-forecasting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">506</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">619</span> Intelligent System for Diagnosis Heart Attack Using Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oluwaponmile%20David%20Alao">Oluwaponmile David Alao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Misdiagnosis has been the major problem in health sector. Heart attack has been one of diseases that have high level of misdiagnosis recorded on the part of physicians. In this paper, an intelligent system has been developed for diagnosis of heart attack in the health sector. Dataset of heart attack obtained from UCI repository has been used. This dataset is made up of thirteen attributes which are very vital in diagnosis of heart disease. The system is developed on the multilayer perceptron trained with back propagation neural network then simulated with feed forward neural network and a recognition rate of 87% was obtained which is a good result for diagnosis of heart attack in medical field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heart%20attack" title="heart attack">heart attack</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=diagnosis" title=" diagnosis"> diagnosis</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20system" title=" intelligent system"> intelligent system</a> </p> <a href="https://publications.waset.org/abstracts/33844/intelligent-system-for-diagnosis-heart-attack-using-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">655</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">618</span> An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lee%20Feng%20Koo">Lee Feng Koo</a>, <a href="https://publications.waset.org/abstracts/search?q=Tze%20Jin%20Wong"> Tze Jin Wong</a>, <a href="https://publications.waset.org/abstracts/search?q=Pang%20Hung%20Yiu"> Pang Hung Yiu</a>, <a href="https://publications.waset.org/abstracts/search?q=Nik%20Mohd%20Asri%20Nik%20Long"> Nik Mohd Asri Nik Long</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=decryption" title="decryption">decryption</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve" title=" elliptic curve"> elliptic curve</a>, <a href="https://publications.waset.org/abstracts/search?q=greater%20common%20divisor" title=" greater common divisor"> greater common divisor</a> </p> <a href="https://publications.waset.org/abstracts/97382/an-attack-on-the-lucas-based-el-gamal-cryptosystem-in-the-elliptic-curve-group-over-finite-field-using-greater-common-divisor" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97382.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">617</span> Cross Site Scripting (XSS) Attack and Automatic Detection Technology Research</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tao%20Feng">Tao Feng</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei-Wei%20Zhang"> Wei-Wei Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Chang-Ming%20Ding"> Chang-Ming Ding</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cross-site scripting (XSS) is one of the most popular WEB Attacking methods at present, and also one of the most risky web attacks. Because of the population of JavaScript, the scene of the cross site scripting attack is also gradually expanded. However, since the web application developers tend to only focus on functional testing and lack the awareness of the XSS, which has made the on-line web projects exist many XSS vulnerabilities. In this paper, different various techniques of XSS attack are analyzed, and a method automatically to detect it is proposed. It is easy to check the results of vulnerability detection when running it as a plug-in. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XSS" title="XSS">XSS</a>, <a href="https://publications.waset.org/abstracts/search?q=no%20target%20attack%20platform" title=" no target attack platform"> no target attack platform</a>, <a href="https://publications.waset.org/abstracts/search?q=automatic%20detection%EF%BC%8CXSS%20detection" title=" automatic detection,XSS detection"> automatic detection,XSS detection</a> </p> <a href="https://publications.waset.org/abstracts/41829/cross-site-scripting-xss-attack-and-automatic-detection-technology-research" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41829.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">403</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">616</span> Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tze%20Jin%20Wong">Tze Jin Wong</a>, <a href="https://publications.waset.org/abstracts/search?q=Lee%20Feng%20Koo"> Lee Feng Koo</a>, <a href="https://publications.waset.org/abstracts/search?q=Pang%20Hung%20Yiu"> Pang Hung Yiu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Lenstra&rsquo;s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC<sub>4,6</sub>) cryptosystem under the Lenstra&rsquo;s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC<sub>3</sub> cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra&rsquo;s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra&rsquo;s attack is less against LUC<sub>4,6</sub> cryptosystem than LUC<sub>3</sub> and LUC cryptosystems. Current study concludes that LUC<sub>4,6</sub> cryptosystem is more secure than LUC and LUC<sub>3</sub> cryptosystems in sustaining against Lenstra&rsquo;s attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lucas%20sequence" title="Lucas sequence">Lucas sequence</a>, <a href="https://publications.waset.org/abstracts/search?q=Dickson%20polynomial" title=" Dickson polynomial"> Dickson polynomial</a>, <a href="https://publications.waset.org/abstracts/search?q=faulty%20signature" title=" faulty signature"> faulty signature</a>, <a href="https://publications.waset.org/abstracts/search?q=corresponding%20signature" title=" corresponding signature"> corresponding signature</a>, <a href="https://publications.waset.org/abstracts/search?q=congruence" title=" congruence"> congruence</a> </p> <a href="https://publications.waset.org/abstracts/97395/cryptographic-attack-on-lucas-based-cryptosystems-using-chinese-remainder-theorem" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97395.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">615</span> A Game of Information in Defense/Attack Strategies: Case of Poisson Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ben%20Yaghlane">Asma Ben Yaghlane</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we briefly introduce the concept of Poisson attacks in the case of defense/attack strategies where attacks are assumed to be continuous. We suggest a game model in which the attacker will combine both criteria of a sufficient confidence level of a successful attack and a reasonably small size of the estimation error in order to launch an attack. Here, estimation error arises from assessing the system failure upon attack using aggregate data at the system level. The corresponding error is referred to as aggregation error. On the other hand, the defender will attempt to deter attack by making one or both criteria inapplicable. The defender will build his/her strategy by both strengthening the targeted system and increasing the size of error. We will formulate the defender problem based on appropriate optimization models. The attacker will opt for a Bayesian updating in assessing the impact on the improvement made by the defender. Then, the attacker will evaluate the feasibility of the attack before making the decision of whether or not to launch it. We will provide illustrations to better explain the process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attacker" title="attacker">attacker</a>, <a href="https://publications.waset.org/abstracts/search?q=defender" title=" defender"> defender</a>, <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title=" game theory"> game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=information" title=" information"> information</a> </p> <a href="https://publications.waset.org/abstracts/38429/a-game-of-information-in-defenseattack-strategies-case-of-poisson-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">468</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">614</span> 11-Round Impossible Differential Attack on Midori64</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhan%20Chen">Zhan Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Wenquan%20Bi"> Wenquan Bi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptanalysis" title="cryptanalysis">cryptanalysis</a>, <a href="https://publications.waset.org/abstracts/search?q=impossible%20differential" title=" impossible differential"> impossible differential</a>, <a href="https://publications.waset.org/abstracts/search?q=light%20weight%20block%20cipher" title=" light weight block cipher"> light weight block cipher</a>, <a href="https://publications.waset.org/abstracts/search?q=Midori" title=" Midori"> Midori</a> </p> <a href="https://publications.waset.org/abstracts/67242/11-round-impossible-differential-attack-on-midori64" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">276</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">613</span> External Sulphate Attack: Advanced Testing and Performance Specifications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Massaad">G. Massaad</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Roziere"> E. Roziere</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Loukili"> A. Loukili</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Izoret"> L. Izoret</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=monitoring%20strategy" title="monitoring strategy">monitoring strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20indicator" title=" performance indicator"> performance indicator</a>, <a href="https://publications.waset.org/abstracts/search?q=sulphate%20attack" title=" sulphate attack"> sulphate attack</a>, <a href="https://publications.waset.org/abstracts/search?q=mechanism%20of%20degradation" title=" mechanism of degradation"> mechanism of degradation</a> </p> <a href="https://publications.waset.org/abstracts/29218/external-sulphate-attack-advanced-testing-and-performance-specifications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29218.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">612</span> A Survey on Countermeasures of Cache-Timing Attack on AES Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Settana%20M.%20Abdulh">Settana M. Abdulh</a>, <a href="https://publications.waset.org/abstracts/search?q=Naila%20A.%20Sadalla"> Naila A. Sadalla</a>, <a href="https://publications.waset.org/abstracts/search?q=Yaseen%20H.%20Taha"> Yaseen H. Taha</a>, <a href="https://publications.waset.org/abstracts/search?q=Howaida%20Elshoush"> Howaida Elshoush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES%20algorithm" title="AES algorithm">AES algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack" title=" side channel attack"> side channel attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20attack" title=" cache timing attack"> cache timing attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20countermeasure" title=" cache timing countermeasure"> cache timing countermeasure</a> </p> <a href="https://publications.waset.org/abstracts/17652/a-survey-on-countermeasures-of-cache-timing-attack-on-aes-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">611</span> Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Swapan%20Maiti">Swapan Maiti</a>, <a href="https://publications.waset.org/abstracts/search?q=Dipanwita%20Roy%20Chowdhury"> Dipanwita Roy Chowdhury</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cellular%20automata" title="cellular automata">cellular automata</a>, <a href="https://publications.waset.org/abstracts/search?q=maximum%20period%20nonlinear%20CA" title=" maximum period nonlinear CA"> maximum period nonlinear CA</a>, <a href="https://publications.waset.org/abstracts/search?q=Meier%20and%20Staffelbach%20attack" title=" Meier and Staffelbach attack"> Meier and Staffelbach attack</a>, <a href="https://publications.waset.org/abstracts/search?q=nonlinear%20functions" title=" nonlinear functions"> nonlinear functions</a> </p> <a href="https://publications.waset.org/abstracts/72864/achieving-better-security-by-using-nonlinear-cellular-automata-as-a-cryptographic-primitive" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72864.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">610</span> An Integrated Geophysical Investigation for Earthen Dam Inspection: A Case Study of Huai Phueng Dam, Udon Thani, Northeastern Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Noppadol%20Poomvises">Noppadol Poomvises</a>, <a href="https://publications.waset.org/abstracts/search?q=Prateep%20Pakdeerod"> Prateep Pakdeerod</a>, <a href="https://publications.waset.org/abstracts/search?q=Anchalee%20Kongsuk"> Anchalee Kongsuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the middle of September 2017, a tropical storm named ‘DOKSURI’ swept through Udon Thani, Northeastern Thailand. The storm dumped heavy rain for many hours and caused large amount of water flowing into Huai Phueng reservoir. Level of impounding water increased rapidly, and the extra water flowed over a service spillway, morning-glory type constructed by concrete material for about 50 years ago. Subsequently, a sinkhole was formed on the dam crest and five points of water piping were found on downstream slope closely to spillway. Three techniques of geophysical investigation were carried out to inspect cause of failures; Electrical Resistivity Imaging (ERI), Multichannel Analysis of Surface Wave (MASW), and Ground Penetrating Radar (GPR), respectively. Result of ERI clearly shows evidence of overtop event and heterogeneity around spillway that implied possibility of previous shape of sinkhole around the pipe. The shear wave velocity of subsurface soil measured by MASW can numerically convert to undrained shear strength of impervious clay core. Result of GPR clearly reveals partial settlements of freeboard zone at top part of the dam and also shaping new refilled material to plug the sinkhole back to the condition it should be. In addition, the GPR image is a main answer to confirm that there are not any sinkholes in the survey lines, only that found on top of the spillway. Integrity interpretation of the three results together with several evidences observed during a field walk-through and data from drilled holes can be interpreted that there are four main causes in this account. The first cause is too much water flowing over the spillway. Second, the water attacking morning glory spillway creates cracks upon concrete contact where the spillway is cross-cut to the center of the dam. Third, high velocity of water inside the concrete pipe sucking fine particle of embankment material down via those cracks and flushing out to the river channel. Lastly, loss of clay material of the dam into the concrete pipe creates the sinkhole at the crest. However, in case of failure by piping, it is possible that they can be formed both by backward erosion (internal erosion along or into embedded structure of spillway walls) and also by excess saturated water of downstream material. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dam%20inspection" title="dam inspection">dam inspection</a>, <a href="https://publications.waset.org/abstracts/search?q=GPR" title=" GPR"> GPR</a>, <a href="https://publications.waset.org/abstracts/search?q=MASW" title=" MASW"> MASW</a>, <a href="https://publications.waset.org/abstracts/search?q=resistivity" title=" resistivity"> resistivity</a> </p> <a href="https://publications.waset.org/abstracts/82673/an-integrated-geophysical-investigation-for-earthen-dam-inspection-a-case-study-of-huai-phueng-dam-udon-thani-northeastern-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82673.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">609</span> Induced Pulsation Attack Against Kalman Filter Driven Brushless DC Motor Control System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuri%20Boiko">Yuri Boiko</a>, <a href="https://publications.waset.org/abstracts/search?q=Iluju%20Kiringa"> Iluju Kiringa</a>, <a href="https://publications.waset.org/abstracts/search?q=Tet%20Yeap"> Tet Yeap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We use modeling and simulation tools, to introduce a novel bias injection attack, named the ’Induced Pulsation Attack’, which targets Cyber Physical Systems with closed-loop controlled Brushless DC (BLDC) motor and Kalman filter driver in the feedback loop. This attack involves engaging a linear function with a constant gradient to distort the coefficient of the injected bias, which falsifies the Kalman filter estimates of the rotor’s angular speed. As a result, this manipulation interaction inside the control system causes periodic pulsations in a form of asymmetric sine wave of both current and voltage in the circuit windings, with a high magnitude. It is shown that by varying the gradient of linear function, one can control both the frequency and structure of the induced pulsations. It is also demonstrated that terminating the attack at any point leads to additional compensating effort from the controller to restore the speed to its equilibrium value. This compensation effort produces an exponentially decaying wave, which we call the ’attack withdrawal syndrome’ wave. The conditions for maximizing or minimizing the impact of the attack withdrawal syndrome are determined. Linking the termination of the attack to the end of the full period of the induced pulsation wave has been shown to nullify the attack withdrawal syndrome wave, thereby improving the attack’s covertness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attack" title="cyber-attack">cyber-attack</a>, <a href="https://publications.waset.org/abstracts/search?q=induced%20pulsation" title=" induced pulsation"> induced pulsation</a>, <a href="https://publications.waset.org/abstracts/search?q=bias%20injection" title=" bias injection"> bias injection</a>, <a href="https://publications.waset.org/abstracts/search?q=Kalman%20filter" title=" Kalman filter"> Kalman filter</a>, <a href="https://publications.waset.org/abstracts/search?q=BLDC%20motor" title=" BLDC motor"> BLDC motor</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20system" title=" control system"> control system</a>, <a href="https://publications.waset.org/abstracts/search?q=closed%20loop" title=" closed loop"> closed loop</a>, <a href="https://publications.waset.org/abstracts/search?q=P-%20controller" title=" P- controller"> P- controller</a>, <a href="https://publications.waset.org/abstracts/search?q=PID-controller" title=" PID-controller"> PID-controller</a>, <a href="https://publications.waset.org/abstracts/search?q=saw-function" title=" saw-function"> saw-function</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-physical%20system" title=" cyber-physical system"> cyber-physical system</a> </p> <a href="https://publications.waset.org/abstracts/164883/induced-pulsation-attack-against-kalman-filter-driven-brushless-dc-motor-control-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164883.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">608</span> Barclays Bank Zambia: Considerations for Raft Foundation Design on Dolomite Land</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yashved%20Serhun">Yashved Serhun</a>, <a href="https://publications.waset.org/abstracts/search?q=Kim%20A.%20Timm"> Kim A. Timm</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Barclays Bank has identified the need for a head office building in Lusaka, Zambia, and construction of a 7200 m2 three-storey reinforced concrete office building with a structural steel roof is currently underway. A unique characteristic of the development is that the building footprint is positioned on dolomitic land. Dolomite rock has the tendency to react with and breakdown in the presence of slightly acidic water, including rainwater. This leads to a potential for subsidence and sinkhole formation. Subsidence and the formation of sinkholes beneath a building can be detrimental during both the construction and operational phases. This paper outlines engineering principles which were considered during the structural design of the raft foundation for the Barclays head office building. In addition, this paper includes multidisciplinary considerations and the impact of these on the structural engineering design of the raft foundation. By ensuring that the design of raft foundations on dolomitic land incorporates the requirements of all disciplines and relevant design codes during the design process, the risk associated with subsidence and sinkhole formation can be effectively mitigated during the operational phase of the building. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dolomite" title="dolomite">dolomite</a>, <a href="https://publications.waset.org/abstracts/search?q=dolomitic%20land" title=" dolomitic land"> dolomitic land</a>, <a href="https://publications.waset.org/abstracts/search?q=raft%20foundation" title=" raft foundation"> raft foundation</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20engineering%20design" title=" structural engineering design"> structural engineering design</a> </p> <a href="https://publications.waset.org/abstracts/108648/barclays-bank-zambia-considerations-for-raft-foundation-design-on-dolomite-land" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108648.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">124</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">607</span> Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ben%20Yaghlane">Asma Ben Yaghlane</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CAR%20processes" title="CAR processes">CAR processes</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%2Fattack%20strategies" title=" defense/attack strategies"> defense/attack strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=exponential%20failure" title=" exponential failure"> exponential failure</a>, <a href="https://publications.waset.org/abstracts/search?q=survivability" title=" survivability"> survivability</a> </p> <a href="https://publications.waset.org/abstracts/83569/modeling-intelligent-threats-case-of-continuous-attacks-on-a-specific-target" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">395</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">606</span> Effect of Waste Foundry Slag and Alccofine on Durability Properties of High Strength Concrete</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Devinder%20Sharma">Devinder Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Sanjay%20Sharma"> Sanjay Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Ajay%20Goyal"> Ajay Goyal</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashish%20Kapoor"> Ashish Kapoor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present research paper discussed the durability properties of high strength concrete (HSC) using Foundry Slag(FD) as partial substitute for fine aggregates (FA) and Alccofine (AF) in addition to portland pozzolana (PPC) cement. Specimens of Concrete M100 grade with water/binder ratio 0.239, with Foundry Slag (FD) varying from 0 to 50% and with optimum quantity of AF(15%) were casted and tested for durability properties such as Water absorption, water permeability, resistance to sulphate attack, alkali attack and nitrate attack of HSC at the age of 7, 14, 28, 56 and 90 days. Substitution of fine aggregates (FA) with up to 45% of foundry slag(FD) content and cement with 15% substitution and addition of alccofine showed an excellent resistance against durability properties at all ages but showed a decrease in these properties with 50% of FD contents. Loss of weight in concrete samples due to sulphate attack, alkali attack and nitrate attack of HSC at the age of 365 days was compared with loss in compressive strength. Correlation between loss in weight and loss in compressive strength in all the tests was found to be excellent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alccofine" title="alccofine">alccofine</a>, <a href="https://publications.waset.org/abstracts/search?q=alkali%20attack" title=" alkali attack"> alkali attack</a>, <a href="https://publications.waset.org/abstracts/search?q=foundry%20slag" title=" foundry slag"> foundry slag</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20strength%20concrete" title=" high strength concrete"> high strength concrete</a>, <a href="https://publications.waset.org/abstracts/search?q=nitrate%20attack" title=" nitrate attack"> nitrate attack</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20absorption" title=" water absorption"> water absorption</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20permeability" title=" water permeability"> water permeability</a> </p> <a href="https://publications.waset.org/abstracts/61016/effect-of-waste-foundry-slag-and-alccofine-on-durability-properties-of-high-strength-concrete" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61016.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">605</span> Experimental Studies on the Corrosion Effects of the Concrete Made with Tannery Effluent </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Nirmalkumar">K. Nirmalkumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An acute water scarcity is prevailing in the dry season in and around Perundurai (Erode district, Tamil Nadu, India) where there are more number of tannery units. Hence an attempt was made to use the effluent from the tannery industry for construction purpose. The mechanical properties such as compressive strength, tensile strength, flexural strength and the special properties such as chloride attack, sulphate attack and chemical attack were studied by casting various concrete specimens in form of cube, cylinders and beams, etc. It was observed that the concrete had some reduction in strength while subjected to chloride attack, sulphate attack and chemical attack. So admixtures were selected and optimized in suitable proportion to counter act the adverse effects and the results were found to be satisfactory. In this research study the corrosion results of specimens prepared by using treated and untreated tannery effluent were compared with the concrete specimens prepared by using potable water. It was observed that by the addition of admixtures, the adverse effects due to the usage of the treated and untreated tannery effluent are counteracted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corrosion" title="corrosion">corrosion</a>, <a href="https://publications.waset.org/abstracts/search?q=calcium%20nitrite" title=" calcium nitrite"> calcium nitrite</a>, <a href="https://publications.waset.org/abstracts/search?q=concrete" title=" concrete"> concrete</a>, <a href="https://publications.waset.org/abstracts/search?q=fly%20ash" title=" fly ash"> fly ash</a> </p> <a href="https://publications.waset.org/abstracts/26488/experimental-studies-on-the-corrosion-effects-of-the-concrete-made-with-tannery-effluent" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">604</span> An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mouad%20Zouina">Mouad Zouina</a>, <a href="https://publications.waset.org/abstracts/search?q=Benaceur%20Outtaj"> Benaceur Outtaj</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=m-commerce" title="m-commerce">m-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=HTTPS" title=" HTTPS"> HTTPS</a>, <a href="https://publications.waset.org/abstracts/search?q=HSTS" title=" HSTS"> HSTS</a>, <a href="https://publications.waset.org/abstracts/search?q=DNSSEC" title=" DNSSEC"> DNSSEC</a>, <a href="https://publications.waset.org/abstracts/search?q=MITM%20bootstrap%20vulnerability" title=" MITM bootstrap vulnerability"> MITM bootstrap vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/65465/an-aspiring-solution-to-the-man-in-the-middle-bootstrap-vulnerability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65465.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">603</span> A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Naghmeh%20Moradpoor%20Sheykhkanloo">Naghmeh Moradpoor Sheykhkanloo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title="neural networks">neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=pattern%20recognition" title=" pattern recognition"> pattern recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection%20attacks" title=" SQL injection attacks"> SQL injection attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection%20attack%20classification" title=" SQL injection attack classification"> SQL injection attack classification</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection%20attack%20detection" title=" SQL injection attack detection "> SQL injection attack detection </a> </p> <a href="https://publications.waset.org/abstracts/22997/a-pattern-recognition-neural-network-model-for-detection-and-classification-of-sql-injection-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22997.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">469</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">602</span> Service Life Modelling of Concrete Deterioration Due to Biogenic Sulphuric Acid (BSA) Attack-State-of-an-Art-Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ankur%20Bansal">Ankur Bansal</a>, <a href="https://publications.waset.org/abstracts/search?q=Shashank%20Bishnoi"> Shashank Bishnoi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Degradation of Sewage pipes, sewage pumping station and Sewage treatment plants(STP) is of major concern due to difficulty in their maintenance and the high cost of replacement. Most of these systems undergo degradation due to Biogenic sulphuric acid (BSA) attack. Since most of Waste water treatment system are underground, detection of this deterioration remains hidden. This paper presents a literature review, outlining the mechanism of this attack focusing on critical parameters of BSA attack, along with available models and software to predict the deterioration due to this attack. This paper critically examines the various steps and equation in various Models of BSA degradation, detail on assumptions and working of different softwares are also highlighted in this paper. The paper also focuses on the service life design technique available through various codes and method to integrate the servile life design with BSA degradation on concrete. In the end, various methods enhancing the resistance of concrete against Biogenic sulphuric acid attack are highlighted. It may be concluded that the effective modelling for degradation phenomena may bring positive economical and environmental impacts. With current computing capabilities integrated degradation models combining the various durability aspects can bring positive change for sustainable society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=concrete%20degradation" title="concrete degradation">concrete degradation</a>, <a href="https://publications.waset.org/abstracts/search?q=modelling" title=" modelling"> modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20life" title=" service life"> service life</a>, <a href="https://publications.waset.org/abstracts/search?q=sulphuric%20acid%20attack" title=" sulphuric acid attack"> sulphuric acid attack</a> </p> <a href="https://publications.waset.org/abstracts/57825/service-life-modelling-of-concrete-deterioration-due-to-biogenic-sulphuric-acid-bsa-attack-state-of-an-art-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">601</span> Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faraji%20Sepideh">Faraji Sepideh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=brute%20force%20attack" title="brute force attack">brute force attack</a>, <a href="https://publications.waset.org/abstracts/search?q=graphical%20password" title=" graphical password"> graphical password</a>, <a href="https://publications.waset.org/abstracts/search?q=shoulder%20surfing%20attack" title=" shoulder surfing attack"> shoulder surfing attack</a>, <a href="https://publications.waset.org/abstracts/search?q=smudge%20attack" title=" smudge attack"> smudge attack</a> </p> <a href="https://publications.waset.org/abstracts/114367/providing-a-secure-hybrid-method-for-graphical-password-authentication-to-prevent-shoulder-surfing-smudge-and-brute-force-attack" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114367.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">600</span> The Journey of a Malicious HTTP Request </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Mansouri">M. Mansouri</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Jaklitsch"> P. Jaklitsch</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Teiniker"> E. Teiniker</a> </p> <p class="card-text"><strong>Abstract:</strong></p> SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Linux%20system%20calls" title="Linux system calls">Linux system calls</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20attack%20detection" title=" web attack detection"> web attack detection</a>, <a href="https://publications.waset.org/abstracts/search?q=interception" title=" interception"> interception</a>, <a href="https://publications.waset.org/abstracts/search?q=SQL" title=" SQL "> SQL </a> </p> <a href="https://publications.waset.org/abstracts/13242/the-journey-of-a-malicious-http-request" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=20">20</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=21">21</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10