The application of science and education to computerrelated crime forensics is still largely limited to law enforcement organizations. Building a suitable workforce development program could support the rapidly growing field of computer and network forensics.
Omega dropwindsondes (ODWs) were released from two NOAA WP-3D aircraft to measure the environmental wind field in the middle and lower troposphere within 1000 km of the center of Hurricane Debby on 15 and 16 September 1982. The observations were coded in standard formats and transmitted from the aircraft to the National Hurricane Center (NHC) and the National Meteorological Center (NMC) before operational forecast deadlines. The ODW winds clearly indicated the location and strength of a midtropo-spheric trough in the westerlies that was the major synoptic-scale feature affecting Debby's motion. On 16 September, the dropwind-sondes also identified a smaller scale cutoff low in the northern part of the trough. The cutoff low that was centered about 500 km to the north northwest of Debby affected the hurricane's motion from midday on the 16th to midday on the 17th. The ODWs provided NHC with timely information that was used subjectively in determining the official forecasts of Debby's track. The potential of the ODWs to improve the track models that serve as guidance for the forecasters at NHC depends upon both the quality of the ODW data and the ability of the operational objective analyses to respond to the ODW data. In 1982, the objective analysis that initialized several of the track models was a spectral analysis with a global domain. At 500 mb, the scale of the wind circulations of Debby and the cutoff low was approximately 500 km. The global operational objective analysis did not resolve these important features. The ODW data can help to improve the objective guidance for the hurricane forecasters only if the operational objective analyses and the track models are designed to make use of the ODW information. To obtain the data needed to revise current models and to develop new models, ODW experiments are planned in the next few years when hurricanes threaten the Atlantic or Gulf coasts of the United States.
As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations' IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers' normal means of "seeing" in a network. Upon a successful attack, the architecture allows IDS components to relocate from attacked hosts to operational hosts thereby mitigating the attack. These capabilities are obtained by using mobile agent technology, utilizing network topology features, and by restricting the communication allowed between different types of IDS components. = IDS sensor = IDS analyzer or controller = Information flow Master-slave Tree hierarchy Non-tree hierarchy, communication only between adjacent levels Non-tree hierarchy, communication allowed between any levels Non-tree nonnarrowing hierarchy, communication allowed between any levels
Abstract. It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might pose such risks. This problem of controlled disclosure of sensitive information is an example of what is known as the aggregation problem. In this paper we argue that it should be possible to articulate specific secrets within a database that should be protected against overdisclosure, and we provide a general framework in which such controlled disclosure can be achieved. Our methods foil any attempt to attack these predefined secrets by disguising queries as queries whose definitions do not resemble secrets, but whose answers nevertheless "nibble" at secrets. Our methods also foil attempts to attack secrets by breaking queries into sequences of smaller requests that extract information less conspicuously. The accounting methods we employ to thwart such attempts are shown to be both accurate and economical.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.