472 research outputs found

    ATLANTIDES: Automatic Configuration for Alert Verification in Network Intrusion Detection Systems

    Get PDF
    We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides useful context information regarding the network services. The false positives raised by the NIDS analyzing the incoming traffic (which can be either signature- or anomaly-based) are reduced by correlating them with the output anomalies. We designed our architecture for TCP-based network services which have a client/server architecture (such as HTTP). Benchmarks show a substantial reduction of false positives between 50% and 100%

    Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    Get PDF
    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements.\ud Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session

    A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements

    Get PDF
    In this paper we present an approach for specifying and prioritizing\ud information security requirements in organizations. It is important\ud to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to\ud satisfy the most important ones. We propose to link explicitly security\ud requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a\ud basis for comparing the importance of different security requirements.\ud A conceptual framework is presented, where the relationships between\ud business vision, critical impact factors and valuable assets (together with\ud their security requirements) are shown

    Electron localization and possible phase separation in the absence of a charge density wave in single-phase 1T-VS2_2

    Full text link
    We report on a systematic study of the structural, magnetic and transport properties of high-purity 1T-VS2_2 powder samples prepared under high pressure. The results differ notably from those previously obtained by de-intercalating Li from LiVS2_2. First, no Charge Density Wave (CDW) is found by transmission electron microscopy down to 94 K. Though, \textit{ab initio} phonon calculations unveil a latent CDW instability driven by an acoustic phonon softening at the wave vector qCDW{\bf q}_{CDW} \approx (0.21,0.21,0) previously reported in de-intercalated samples. A further indication of latent lattice instability is given by an anomalous expansion of the V-S bond distance at low temperature. Second, infrared optical absorption and electrical resistivity measurements give evidence of non metallic properties, consistent with the observation of no CDW phase. On the other hand, magnetic susceptibility and NMR data suggest the coexistence of localized moments with metallic carriers, in agreement with \textit{ab initio} band structure calculations. This discrepancy is reconciled by a picture of electron localization induced by disorder or electronic correlations leading to a phase separation of metallic and non-metallic domains in the nm scale. We conclude that 1T-VS2_2 is at the verge of a CDW transition and suggest that residual electronic doping in Li de-intercalated samples stabilizes a uniform CDW phase with metallic properties.Comment: 22 pages, 10 Figures. Full resolution pictures available at http://journals.aps.org/prb/abstract/10.1103/PhysRevB.89.23512

    A 3-dimensional transnasal endoscopic journey through the paranasal sinuses and adjacent skull base: a practical and surgery-oriented perspective

    Get PDF
    An endoscopic approach through the transnasal corridor is currently the treatment of choice in the management of benign sinonasal tumors, cerebrospinal fluid leaks, and pituitary lesions. Moreover, this approach can be considered a valid option in the management of selected sinonasal malignancies extending to the skull base, midline meningiomas, parasellar lesions such as craniopharyngioma and Rathke cleft cyst, and clival lesions such as chordoma and ecchordosis. Over the past decade, strict cooperation between otorhinolaryngologists and neurosurgeons and acquired surgical skills, together with high-definition cameras, dedicated instrumentation, and navigation systems, have made it possible to broaden the indications of endoscopic surgery. Despite these improvements, depth perception, as provided by the use of a microscope, was still lacking with this technology. The aim of the present project is to reveal new perspectives in the endoscopic perception of the sinonasal complex and skull base thanks to 3-dimensional endoscopes, which are well suited to access and explore the endonasal corridor. In the anatomic dissection herein, this innovative device came across with sophisticated and long-established fresh cadaver preparation provided by one of the most prestigious universities of Europe. The final product is a 3-dimensional journey starting from the nasal cavity, reaching the anterior, middle, and posterior cranial fossae, passing through the ethmoidal complex, paranasal sinuses, and skull base. Anatomic landmarks, critical areas, and tips and tricks to safely dissect delicate anatomic structures are addressed through audio comments, figures, and their captions

    Higgs Physics: Theory

    Full text link
    I review the theoretical aspects of the physics of Higgs bosons, focusing on the elements that are relevant for the production and detection at present hadron colliders. After briefly summarizing the basics of electroweak symmetry breaking in the Standard Model, I discuss Higgs production at the LHC and at the Tevatron, with some focus on the main production mechanism, the gluon-gluon fusion process, and summarize the main Higgs decay modes and the experimental detection channels. I then briefly survey the case of the minimal supersymmetric extension of the Standard Model. In a last section, I review the prospects for determining the fundamental properties of the Higgs particles once they have been experimentally observed.Comment: 21 pages, 15 figures. Talk given at the XXV International Symposium on Lepton Photon Interactions at High Energies (Lepton Photon 11), 22-27 August 2011, Mumbai, Indi

    BFKL at Next-to-Next-to-Leading Order

    Get PDF
    We determine an approximate expression for the O(alpha_s^3) contribution chi_2 to the kernel of the BFKL equation, which includes all collinear and anticollinear singular contributions. This is derived using recent results on the relation between the GLAP and BFKL kernels (including running-coupling effects to all orders) and on small-x factorization schemes. We present the result in various schemes, relevant both for applications to the BFKL equation and to small-x evolution of parton distributions.Comment: 34 pages, 6 figures, TeX with harvmac. Various small typos corrects, in particular first term in eq D.3. Final version to be published in Nucl. Phys.

    The fully differential hadronic production of a Higgs boson via bottom quark fusion at NNLO

    Full text link
    The fully differential computation of the hadronic production cross section of a Higgs boson via bottom quarks is presented at NNLO in QCD. Several differential distributions with their corresponding scale uncertainties are presented for the 8 TeV LHC. This is the first application of the method of non-linear mappings for NNLO differential calculations at hadron colliders.Comment: 27 pages, 13 figures, 1 lego plo

    Space-like (vs. time-like) collinear limits in QCD: is factorization violated?

    Get PDF
    We consider the singular behaviour of QCD scattering amplitudes in kinematical configurations where two or more momenta of the external partons become collinear. At the tree level, this behaviour is known to be controlled by factorization formulae in which the singular collinear factor is universal (process independent). We show that this strict (process-independent) factorization is not valid at one-loop and higher-loop orders in the case of the collinear limit in space-like regions (e.g., collinear radiation from initial-state partons). We introduce a generalized version of all-order collinear factorization, in which the space-like singular factors retain some dependence on the momentum and colour charge of the non-collinear partons. We present explicit results on one-loop and two-loop amplitudes for both the two-parton and multiparton collinear limits. At the level of square amplitudes and, more generally, cross sections in hadron--hadron collisions, the violation of strict collinear factorization has implications on the non-abelian structure of logarithmically-enhanced terms in perturbative calculations (starting from the next-to-next-to-leading order) and on various factorization issues of mass singularities (starting from the next-to-next-to-next-to-leading order).Comment: 81 pages, 5 figures, typos corrected in the text, few comments added and inclusion of NOTE ADDED on recent development
    corecore