Difference between revisions of "Template:Article of the week"

From LIMSWiki
Jump to navigationJump to search
(Updated article of the week text)
(Updated article of the week text)
(13 intermediate revisions by the same user not shown)
Line 1: Line 1:
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig3 Teixeira FutureInternet2018 10-8.png|240px]]</div>
'''"[[Journal:Defending our public biological databases as a global critical infrastructure|Defending our public biological databases as a global critical infrastructure]]"'''
'''"[[Journal:SCADA system testbed for cybersecurity research using machine learning approach|SCADA system testbed for cybersecurity research using machine learning approach]]"'''


This paper presents the development of a [[supervisory control and data acquisition]] (SCADA) system testbed used for [[cybersecurity]] research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attacks, the network traffic was captured, and features were extracted from the traffic to build a dataset for training and testing different machine learning algorithms. Five traditional machine learning algorithms were trained to detect the attacks: Random Forest, Decision Tree, Logistic Regression, Naïve Bayes, and KNN. Then, the trained machine learning models were built and deployed in the network, where new tests were made using online network traffic. The performance obtained during the training and testing of the machine learning models was compared to the performance obtained during the online deployment of these models in the network. The results show the efficiency of the machine learning models in detecting the attacks in real time. The testbed provides a good understanding of the effects and consequences of attacks on real SCADA environments. ('''[[Journal:Semantics for an integrative and immersive pipeline combining visualization and analysis of molecular data|Full article...]]''')<br />
Progress in modern biology is being driven, in part, by the large amounts of freely available data in public resources such as the International Nucleotide Sequence Database Collaboration (INSDC), the world's primary database of biological sequence (and related) [[information]]. INSDC and similar databases have dramatically increased the pace of fundamental biological discovery and enabled a host of innovative therapeutic, diagnostic, and forensic applications. However, as high-value, openly shared resources with a high degree of assumed trust, these repositories share compelling similarities to the early days of the internet. Consequently, as public biological databases continue to increase in size and importance, we expect that they will face the same threats as undefended cyberspace. There is a unique opportunity, before a significant breach and loss of trust occurs, to ensure they evolve with quality and security as a design philosophy rather than costly “retrofitted” mitigations. This perspective article surveys some potential quality assurance and security weaknesses in existing open [[Genomics|genomic]] and [[Proteomics|proteomic]] repositories, describes methods to mitigate the likelihood of both intentional and unintentional errors, and offers recommendations for risk mitigation based on lessons learned from [[cybersecurity]]. ('''[[Journal:Defending our public biological databases as a global critical infrastructure|Full article...]]''')<br />
<br />
<br />
''Recently featured'':
''Recently featured'':
: ▪ [[Journal:Semantics for an integrative and immersive pipeline combining visualization and analysis of molecular data|Semantics for an integrative and immersive pipeline combining visualization and analysis of molecular data]]
: ▪ [[Journal:Determining the hospital information system (HIS) success rate: Development of a new instrument and case study|Determining the hospital information system (HIS) success rate: Development of a new instrument and case study]]
: ▪ [[Journal:A view of programming scalable data analysis: From clouds to exascale|A view of programming scalable data analysis: From clouds to exascale]]
: ▪ [[Journal:Smart information systems in cybersecurity: An ethical analysis|Smart information systems in cybersecurity: An ethical analysis]]
: ▪ [[Journal:Transferring exome sequencing data from clinical laboratories to healthcare providers: Lessons learned at a pediatric hospital|Transferring exome sequencing data from clinical laboratories to healthcare providers: Lessons learned at a pediatric hospital]]
: ▪ [[Journal:Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome|Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome]]

Revision as of 15:16, 23 July 2019

"Defending our public biological databases as a global critical infrastructure"

Progress in modern biology is being driven, in part, by the large amounts of freely available data in public resources such as the International Nucleotide Sequence Database Collaboration (INSDC), the world's primary database of biological sequence (and related) information. INSDC and similar databases have dramatically increased the pace of fundamental biological discovery and enabled a host of innovative therapeutic, diagnostic, and forensic applications. However, as high-value, openly shared resources with a high degree of assumed trust, these repositories share compelling similarities to the early days of the internet. Consequently, as public biological databases continue to increase in size and importance, we expect that they will face the same threats as undefended cyberspace. There is a unique opportunity, before a significant breach and loss of trust occurs, to ensure they evolve with quality and security as a design philosophy rather than costly “retrofitted” mitigations. This perspective article surveys some potential quality assurance and security weaknesses in existing open genomic and proteomic repositories, describes methods to mitigate the likelihood of both intentional and unintentional errors, and offers recommendations for risk mitigation based on lessons learned from cybersecurity. (Full article...)

Recently featured:

Determining the hospital information system (HIS) success rate: Development of a new instrument and case study
Smart information systems in cybersecurity: An ethical analysis
Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome