摘要:
Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
摘要:
A method of determining an average degree of saturation with ammonia (X) of a solid ammonia storage medium porous or not and capable of ad- or absorbing and desorbing ammonia reversibly in a storage container is described. A part of the volume (Vcon) of the container is occupied by gaseous ammonia of a pressure (p) and defines a free volume (Vfree)). Ammonia flows out of the container with a flow (f). n pairs ((fi, pi), (Fi, pi)) of flows (fi), or accumulated flows (Fi), and pressures (pi) are sampled at a sequence of points of time (ti), i=1 . . . n and n≧2; an estimate volume value (Vfit) on the basis of the sampled pairs ((fi, pi), (Fi, pi)) is determined;and the degree of saturation with ammonia (X) is determined by applying a predetermined relationship (Rel) between a plurality of estimate volume values (Vfit) and a plurality of values of the average degree of saturation with ammonia (X) to the determined estimate volume value (Vfit).
摘要:
One embodiment relates to a method of providing a computer security service via instant messaging. An instant message is received from an originating user account. The instant message is parsed to identify files and universal resource locators (URLs) in the instant message. If any files are identified, then said identified file(s) are scanned for malicious code to generate scan results. If any URLs are identified, then said identified URL(s) are checked against a ratings database to generate rating results. A responsive instant message to the originating user account is generated, wherein the responsive instant message includes said scan and rating results. Other embodiments, aspects and features are also disclosed.
摘要:
The present invention relates to a vibration signal processing method and system that can be used to account for situations where impact or impulse events are hidden in a normal vibration reading by low frequency vibrations and high frequency noise. In one preferred form, the method of the present invention comprises the steps of obtaining electrical vibration signals that represent mechanical vibrations of a machine (102-106), converting the electrical vibration signals into digital vibration samples (108), dividing the digital vibration samples into equal time intervals and determining the average absolute amplitude of the digital vibration samples for each time interval (110), generating a time waveform comprising the determined average amplitudes (112, 114), and processing the time waveform as if it were an independently-detected signal (116-120).
摘要:
An enterprise-wide sharing arrangement uses a semantic abstraction, called a security assessment, to share security-related information between different security products, called endpoints. A security assessment is defined as a tentative assignment by an endpoint of broader contextual meaning to information that is collected about an object of interest. Endpoints may publish security assessments onto a security assessment channel, as well as subscribe to a subset of security assessments published by other endpoints. A specialized endpoint is coupled to the channel that performs as a centralized audit point by subscribing to all security assessments, logging the security assessments, and also logging the local actions taken by endpoints in response to received security assessments. Manual operations are supported by the specialized endpoint including manual approval of actions, security assessment cancellation, and manual injection of security assessments into the security assessment channel.
摘要:
A driving assisting for calculating risk potential by considering a response delay by the driver and transmitting information related to the risk potential to the operator in a haptic manner. A controller is provided to estimate the response delay based on an operation performed by the operator. Based on the estimated response delay, the controller calculates a future position at which the risk potential is to be calculated. The longer the response delay, the remoter the future position is. The shorter the response delay, the nearer the future position is. The calculated risk potential at the future position may be transmitted to the operator via a pressing force from one of right and left side portions of a driver's seat occupied by the operator.
摘要:
A method, system, apparatus, and computer program product are presented for providing a user with the ability to limit the receipt of unwanted email messages. An encoded email identifier is generated by combining the user's local mailbox identifier along with encoded email acceptance parameter values that represent email acceptance criteria. The encoded email identifier is then used as the local-part portion of an email address in place of the user's local mailbox identifier. After receiving an incoming email message in which the encoded email identifier is a portion of the destination address of the incoming email message, an email server delivers the email message in accordance with the local mailbox identifier that is embedded in the encoded email identifier in response to a determination that one or more characteristics of the email message satisfy one or more email acceptance criteria that are encoded within the encoded email identifier.