-
The power of relativistic jets: a comparative study
Authors:
Luigi Foschini,
Benedetta Dalla Barba,
Merja Tornikoski,
Heinz Andernach,
Paola Marziani,
Alan P. Marscher,
Svetlana G. Jorstad,
Emilia Järvelä,
Sonia Antón,
Elena Dalla Bontà
Abstract:
We present the results of a comparison between different methods to estimate the power of relativistic jets from active galactic nuclei (AGN). We selected a sample of 32 objects (21 flat-spectrum radio quasars, 7 BL Lacertae Objects, 2 misaligned AGN, and 2 changing-look AGN) from the Very Large Baseline Array (VLBA) observations at 43 GHz of the Boston University blazar program. We then calculate…
▽ More
We present the results of a comparison between different methods to estimate the power of relativistic jets from active galactic nuclei (AGN). We selected a sample of 32 objects (21 flat-spectrum radio quasars, 7 BL Lacertae Objects, 2 misaligned AGN, and 2 changing-look AGN) from the Very Large Baseline Array (VLBA) observations at 43 GHz of the Boston University blazar program. We then calculated the total, radiative, and kinetic jet power from both radio and high-energy gamma-ray observations, and compare the values. We found an excellent agreement between the radiative power calculated by using the Blandford and Königl model with 37 or 43 GHz data, and the values derived from the high-energy $γ-$ray luminosity. The agreement is still acceptable if 15 GHz data are used, although with a larger dispersion, but it improves if we use a constant fraction of the $γ-$ray luminosity. We found a good agreement also for the kinetic power calculated with Blandford and Königl model with 15 GHz data, and the value from the extended radio emission. We also propose some easy-to-use equations to estimate the jet power.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Obscuration in high redshift jetted QSO
Authors:
A. Caccianiga,
L. Ighina,
A. Moretti,
R. Brivio,
S. Belladitta,
D. Dallacasa,
C. S**ola,
M. J. Marchã,
S. Antón
Abstract:
Obscuration in high-redshift quasi-stellar objects (QSO) has a profound impact on our understanding of the evolution of supermassive black holes across the cosmic time. An accurate quantification of its relevance is therefore mandatory. We present a study aimed at evaluating the importance of obscuration in high redshift jetted QSO, i.e. those active nuclei characterized by the presence of powerfu…
▽ More
Obscuration in high-redshift quasi-stellar objects (QSO) has a profound impact on our understanding of the evolution of supermassive black holes across the cosmic time. An accurate quantification of its relevance is therefore mandatory. We present a study aimed at evaluating the importance of obscuration in high redshift jetted QSO, i.e. those active nuclei characterized by the presence of powerful relativistic jets. We compare the observed number of radio detected QSO at different radio flux density limits with the value predicted by the beaming model on the basis of the number of oriented sources (blazars). Any significant deficit of radio-detected QSO compared to the predictions can be caused by the presence of obscuration along large angles from the jet direction. We apply this method to two sizable samples characterized by the same optical limit (mag=21) but significantly different radio density limits (30 mJy and 1 mJy respectively) and containing a total of 87 independent radio-loud 4<z<6.8 QSO, 31 of which classified as blazars. We find a general good agreement between the numbers predicted by the model and those actually observed, with only a marginal discrepancy at 0.5 mJy that could be caused by the lack of completeness of the sample. We conclude that we have no evidence of obscuration within angles 10-20deg from the relativistic jet direction. We also show how the ongoing deep wide-angle radio surveys will be instrumental to test the presence of obscuration at much larger angles, up to 30-35deg. We finally suggest that, depending on the actual fraction of obscured QSO, relativistic jets could be much more common at high redshifts compared to what is usually observed in the local Universe
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
A New Sample of Gamma-Ray Emitting Jetted Active Galactic Nuclei
Authors:
Luigi Foschini,
Matthew L. Lister,
Heinz Andernach,
Stefano Ciroi,
Paola Marziani,
Sonia Antón,
Marco Berton,
Elena Dalla Bontà,
Emilia Järvelä,
Maria J. M. Marchã,
Patrizia Romano,
Merja Tornikoski,
Stefano Vercellone,
Amelia Vietri
Abstract:
We considered the fourth catalog of gamma-ray point sources produced by the Fermi Large Area Telescope (LAT) and selected only jetted active galactic nuclei (AGN) or sources with no specific classification, but with a low-frequency counterpart. Our final list is composed of 2980 gamma-ray point sources. We then searched for optical spectra in all the available literature and publicly available dat…
▽ More
We considered the fourth catalog of gamma-ray point sources produced by the Fermi Large Area Telescope (LAT) and selected only jetted active galactic nuclei (AGN) or sources with no specific classification, but with a low-frequency counterpart. Our final list is composed of 2980 gamma-ray point sources. We then searched for optical spectra in all the available literature and publicly available databases, to measure redshifts and to confirm or change the original LAT classification. Our final list of gamma-ray emitting jetted AGN is composed of BL Lac Objects (40%), flat-spectrum radio quasars (23%), misaligned AGN (2.8%), narrow-line Seyfert 1, Seyfert, and low-ionization nuclear emission-line region galaxies (1.9%). We also found a significant number of objects changing from one type to another, and vice versa (changing-look AGN, 1.1%). About 30% of gamma-ray sources still have an ambiguous classification or lack one altogether.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
On Explainability in AI-Solutions: A Cross-Domain Survey
Authors:
Simon Daniel Duque Anton,
Daniel Schneider,
Hans Dieter Schotten
Abstract:
Artificial Intelligence (AI) increasingly shows its potential to outperform predicate logic algorithms and human control alike. In automatically deriving a system model, AI algorithms learn relations in data that are not detectable for humans. This great strength, however, also makes use of AI methods dubious. The more complex a model, the more difficult it is for a human to understand the reasoni…
▽ More
Artificial Intelligence (AI) increasingly shows its potential to outperform predicate logic algorithms and human control alike. In automatically deriving a system model, AI algorithms learn relations in data that are not detectable for humans. This great strength, however, also makes use of AI methods dubious. The more complex a model, the more difficult it is for a human to understand the reasoning for the decisions. As currently, fully automated AI algorithms are sparse, every algorithm has to provide a reasoning for human operators. For data engineers, metrics such as accuracy and sensitivity are sufficient. However, if models are interacting with non-experts, explanations have to be understandable. This work provides an extensive survey of literature on this topic, which, to a large part, consists of other surveys. The findings are mapped to ways of explaining decisions and reasons for explaining decisions. It shows that the heterogeneity of reasons and methods of and for explainability lead to individual explanatory frameworks.
△ Less
Submitted 11 October, 2022;
originally announced October 2022.
-
On the Automated Detection of Corneal Edema with Second Harmonic Generation Microscopy and Deep Learning
Authors:
Stefan R. Anton,
Rosa M. Martínez-Ojeda,
Radu Hristu,
George A. Stanciu,
Antonela Toma,
Cosmin K. Banica,
Enrique J. Fernández,
Mikko Huttunen,
Juan M. Bueno,
Stefan G. Stanciu
Abstract:
When the cornea becomes hydrated above its physiologic level it begins to significantly scatter light, loosing transparency and thus impairing eyesight. This condition, known as corneal edema, can be associated with different causes, such as corneal scarring, corneal infection, corneal inflammation, and others, making it difficult to diagnose and quantify. Previous works have shown that Second Har…
▽ More
When the cornea becomes hydrated above its physiologic level it begins to significantly scatter light, loosing transparency and thus impairing eyesight. This condition, known as corneal edema, can be associated with different causes, such as corneal scarring, corneal infection, corneal inflammation, and others, making it difficult to diagnose and quantify. Previous works have shown that Second Harmonic Generation Microscopy (SHG) represents a valuable non-linear optical imaging tool to non-invasively identify and monitor changes in the collagen architecture of the cornea, potentially playing a pivotal role in future in-vivo cornea diagnostic methods. However, the interpretation of SHG data can pose significant problems when transferring such approaches to clinical settings, given the low availability of public data sets, and training resources. In this work we explore the use of three Deep Learning models, the highly popular InceptionV3 and ResNet50, alongside FLIMBA, a custom developed architecture, requiring no pre-training, to automatically detect corneal edema in SHG images of porcine cornea. We discuss and evaluate data augmentation strategies tuned to the specifics of the herein addressed application and observe that Deep Learning models building on different architectures provide complementary results. Importantly, we observe that the combined use of such complementary models boosts the overall classification performance in the case of differentiating edematous and healthy corneal tissues, up to an AU-ROC=0.98. These results have potential to be extrapolated to other diagnostics scenarios, such as differentiation of corneal edema in different stages, automated extraction of hydration level of cornea, or automated identification of corneal edema causes, and thus pave the way for novel methods for cornea diagnostics with Deep-Learning assisted non-linear optical imaging.
△ Less
Submitted 14 November, 2022; v1 submitted 1 October, 2022;
originally announced October 2022.
-
The VMC Survey -- XLIX. Discovery of a population of quasars dominated by nuclear dust emission behind the Magellanic Clouds
Authors:
Clara M. Pennock,
Jacco Th. van Loon,
Joy O. Anih,
Chandreyee Maitra,
Frank Haberl,
Anne E. Sansom,
Valentin D. Ivanov,
Michael J. Cowley,
José Afonso,
Sonia Antón,
Maria-Rosa L. Cioni,
Jessica E. M. Craig,
Miroslav D. Filipović,
Andrew M. Hopkins,
Ambra Nanni,
Isabella Prandoni,
Eleni Vardoulaki
Abstract:
Following the discovery of SAGE0536AGN ($z \sim$ 0.14), with the strongest 10-$μ$m silicate emission ever observed for an Active Galactic Nucleus (AGN), we discovered SAGE0534AGN ($z \sim$ 1.01), a similar AGN but with less extreme silicate emission. Both were originally mistaken as evolved stars in the Magellanic Clouds. Lack of far-infrared emission, and therefore star-formation, implies we are…
▽ More
Following the discovery of SAGE0536AGN ($z \sim$ 0.14), with the strongest 10-$μ$m silicate emission ever observed for an Active Galactic Nucleus (AGN), we discovered SAGE0534AGN ($z \sim$ 1.01), a similar AGN but with less extreme silicate emission. Both were originally mistaken as evolved stars in the Magellanic Clouds. Lack of far-infrared emission, and therefore star-formation, implies we are seeing the central engine of the AGN without contribution from the host galaxy. They could be a key link in galaxy evolution. We used a dimensionality reduction algorithm, t-SNE (t-distributed Stochastic Neighbourhood Embedding) with multi-wavelength data from Gaia EDR3, VISTA survey of the Magellanic Clouds, AllWISE and the Australian SKA Pathfinder to find these two unusual AGN are grouped with 16 other objects separated from the rest, suggesting a rare class. Our spectroscopy at SAAO/SALT and literature data confirm at least 14 of these objects are extragalactic ($0.13 < z < 1.23$), all hosting AGN. Using spectral energy distribution fitter CIGALE we find that the majority of dust emission ($> 70 \%$) in these sources is due to the AGN. Host galaxies appear to be either in or transitioning into the green valley. There is a trend of a thinning torus, increasing X-ray luminosity and decreasing Eddington ratio as the AGN transition through the green valley, implying that as the accretion supply depletes, the torus depletes and the column density reduces. Also, the near-infrared variability amplitude of these sources correlates with attenuation by the torus, implying the torus plays a role in the variability.
△ Less
Submitted 25 July, 2022;
originally announced July 2022.
-
The Global State of Security in Industrial Control Systems: An Empirical Analysis of Vulnerabilities around the World
Authors:
Simon Daniel Duque Anton,
Daniel Fraunholz,
Daniel Krohmer,
Daniel Reti,
Daniel Schneider,
Hans Dieter Schotten
Abstract:
Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. Efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and org…
▽ More
Operational Technology (OT)-networks and -devices, i.e. all components used in industrial environments, were not designed with security in mind. Efficiency and ease of use were the most important design characteristics. However, due to the digitisation of industry, an increasing number of devices and industrial networks is opened up to public networks. This is beneficial for administration and organisation of the industrial environments. However, it also increases the attack surface, providing possible points of entry for an attacker. Originally, breaking into production networks meant to break an Information Technology (IT)-perimeter first, such as a public website, and then to move laterally to Industrial Control Systems (ICSs) to influence the production environment. However, many OT-devices are connected directly to the Internet, which drastically increases the threat of compromise, especially since OT-devices contain several vulnerabilities. In this work, the presence of OT-devices in the Internet is analysed from an attacker's perspective. Publicly available tools, such as the search engine Shodan and vulnerability databases, are employed to find commonly used OT-devices and map vulnerabilities to them. These findings are grouped according to country of origin, manufacturer, and number as well as severity of vulnerability. More than 13000 devices were found, almost all contained at least one vulnerability. European and Northern American countries are by far the most affected ones.
△ Less
Submitted 27 November, 2021;
originally announced November 2021.
-
A New Sample of Gamma-Ray Emitting Jetted Active Galactic Nuclei -- Preliminary Results
Authors:
L. Foschini,
M. L. Lister,
S. Antón,
M. Berton,
S. Ciroi,
M. J. M. Marchã,
M. Tornikoski,
E. Järvelä,
P. Romano,
S. Vercellone,
E. Dalla Bontà
Abstract:
We are compiling a new list of gamma-ray jetted active galactic nuclei (AGN), starting from the fourth catalog of point sources of the Fermi Large Area Telescope (LAT). Our aim is to prepare a list of jetted AGN with known redshifts and classifications to be used to calibrate jet power. We searched in the available literature for all the published optical spectra and multiwavelength studies useful…
▽ More
We are compiling a new list of gamma-ray jetted active galactic nuclei (AGN), starting from the fourth catalog of point sources of the Fermi Large Area Telescope (LAT). Our aim is to prepare a list of jetted AGN with known redshifts and classifications to be used to calibrate jet power. We searched in the available literature for all the published optical spectra and multiwavelength studies useful to characterize the sources. We found new, missed, or even forgotten information leading to a substantial change in the redshift values and classification of many sources. We present here the preliminary results of this analysis and some statistics based on the gamma-ray sources with right ascension within the interval $0^{\rm h}-12^{\rm h}$ (J2000). Although flat-spectrum radio quasars and BL Lac objects are still the dominant populations, there is a significant increase in the number of other objects, such as misaligned AGN, narrow-line Seyfert 1 galaxies, and Seyfert galaxies. We also introduced two new classes of objects: changing-look AGN and ambiguous sources. About one third of the sources remain unclassified.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
Knowledge Rocks:Adding Knowledge Assistance to Visualization Systems
Authors:
Anna-Pia Lohfink,
Simon D. Duque Anton,
Heike Leitte,
Christoph Garth
Abstract:
We present Knowledge Rocks, an implementation strategy and guideline for augmenting visualization systems to knowledge-assisted visualization systems, as defined by the KAVA model. Visualization systems become more and more sophisticated. Hence, it is increasingly important to support users with an integrated knowledge base in making constructive choices and drawing the right conclusions. We suppo…
▽ More
We present Knowledge Rocks, an implementation strategy and guideline for augmenting visualization systems to knowledge-assisted visualization systems, as defined by the KAVA model. Visualization systems become more and more sophisticated. Hence, it is increasingly important to support users with an integrated knowledge base in making constructive choices and drawing the right conclusions. We support the effective reactivation of visualization software resources by augmenting them with knowledge-assistance. To provide a general and yet supportive implementation strategy, we propose an implementation process that bases on an application-agnostic architecture. This architecture is derived from existing knowledge-assisted visualization systems and the KAVA model. Its centerpiece is an ontology that is able to automatically analyze and classify input data, linked to a database to store classified instances. We discuss design decisions and advantages of the KR framework and illustrate its broad area of application in diverse integration possibilities of this architecture into an existing visualization system. In addition, we provide a detailed case study by augmenting an it-security system with knowledge-assistance facilities.
△ Less
Submitted 8 November, 2021; v1 submitted 23 July, 2021;
originally announced July 2021.
-
Radio astronomy and Space science in Azores: enhancing the Atlantic VLBI infrastructure cluster
Authors:
Domingos Barbosa,
Bruno Coelho,
Sonia Antón,
Miguel Bergano,
Tjarda Boekholt,
Alexandre C. M. Correia,
Dalmiro Maia,
João Pandeirada,
Valério Ribeiro,
Jason Adams,
João Paulo Barraca,
Diogo Gomes,
Bruno Morgado
Abstract:
Radio astronomy and Space Infrastructures in the Azores have a great scientific and industrial interest because they benefit from a unique geographical location in the middle of the North Atlantic allowing a vast improvement in the sky coverage. This fact obviously has a very high added value for: i) the establishment of space tracking and communications networks for the emergent global small sate…
▽ More
Radio astronomy and Space Infrastructures in the Azores have a great scientific and industrial interest because they benefit from a unique geographical location in the middle of the North Atlantic allowing a vast improvement in the sky coverage. This fact obviously has a very high added value for: i) the establishment of space tracking and communications networks for the emergent global small satellite fleets ii) it is invaluable to connect the radio astronomy infrastructure networks in Africa, Europe and America continents using Very Large Baseline Interferometry (VLBI) techniques, iii) it allows excellent potential for monitoring space debris and Near Earth Objects (NEOs). There is in S. Miguel island a 32-metre SATCOM antenna that could be integrated in advanced VLBI networks and be capable of additional Deep Space Network ground support. This paper explores the space science opportunities offered by the upgrade of the S. Miguel 32-metre SATCOM antenna into a world-class infrastructure for radio astronomy and space exploration: it would enable a Deep Space Network mode and would constitute a key space facility for data production, promoting local digital infrastructure investments and the testing of cutting-edge information technologies. Its Atlantic location also enables improvements in angular resolution, provides many baseline in East-West and North-South directions connecting the emergent VLBI stations in America to Europe and Africa VLBI arrays therefore contributing for greater array imaging capabilities especially for sources or well studied fields close to or below the celestial equator, where ESO facilities, ALMA, SKA and its precursors do or will operate and observe in the coming decades.
△ Less
Submitted 7 July, 2021;
originally announced July 2021.
-
The BINGO Project I: Baryon Acoustic Oscillations from Integrated Neutral Gas Observations
Authors:
Elcio Abdalla,
Elisa G. M. Ferreira,
Ricardo G. Landim,
Andre A. Costa,
Karin S. F. Fornazier,
Filipe B. Abdalla,
Luciano Barosi,
Francisco A. Brito,
Amilcar R. Queiroz,
Thyrso Villela,
Bin Wang,
Carlos A. Wuensche,
Alessandro Marins,
Camila P. Novaes,
Vincenzo Liccardo,
Chenxi Shan,
Jiajun Zhang,
Zhongli Zhang,
Zhenghao Zhu,
Ian Browne,
Jacques Delabrouille,
Larissa Santos,
Marcelo V. dos Santos,
Haiguang Xu,
Sonia Anton
, et al. (21 additional authors not shown)
Abstract:
Observations of the redshifted 21-cm line of neutral hydrogen (HI) are a new and powerful window of observation that offers us the possibility to map the spatial distribution of cosmic HI and learn about cosmology. BINGO (Baryon Acoustic Oscillations [BAO] from Integrated Neutral Gas Observations) is a new unique radio telescope designed to be one of the first to probe BAO at radio frequencies. BI…
▽ More
Observations of the redshifted 21-cm line of neutral hydrogen (HI) are a new and powerful window of observation that offers us the possibility to map the spatial distribution of cosmic HI and learn about cosmology. BINGO (Baryon Acoustic Oscillations [BAO] from Integrated Neutral Gas Observations) is a new unique radio telescope designed to be one of the first to probe BAO at radio frequencies. BINGO has two science goals: cosmology and astrophysics. Cosmology is the main science goal and the driver for BINGO's design and strategy. The key of BINGO is to detect the low redshift BAO to put strong constraints in the dark sector models. Given the versatility of the BINGO telescope, a secondary goal is astrophysics, where BINGO can help discover and study Fast Radio Bursts (FRB) and other transients, Galactic and extragalactic science. In this paper, we introduce the latest progress of the BINGO project, its science goals, describing the scientific potential of the project in each science and the new developments obtained by the collaboration. We introduce the BINGO project and its science goals and give a general summary of recent developments in construction, science potential and pipeline development obtained by the BINGO collaboration in the past few years. We show that BINGO will be able to obtain competitive constraints for the dark sector, and also that will allow for the discovery of several FRBs in the southern hemisphere. The capacity of BINGO in obtaining information from 21-cm is also tested in the pipeline introduced here. There is still no measurement of the BAO in radio, and studying cosmology in this new window of observations is one of the most promising advances in the field. The BINGO project is a radio telescope that has the goal to be one of the first to perform this measurement and it is currently being built in the northeast of Brazil. (Abridged)
△ Less
Submitted 12 October, 2021; v1 submitted 4 July, 2021;
originally announced July 2021.
-
The ASKAP-EMU Early Science Project: 888 MHz Radio Continuum Survey of the Large Magellanic Cloud
Authors:
Clara M. Pennock,
Jacco Th. van Loon,
Miroslav D. Filipovic,
Heinz Andernach,
Frank Haberl,
Roland Kothes,
Emil Lenc,
Lawrence Rudnick,
Sarah V. White,
Claudia Agliozzo,
Sonia Antón,
Ivan Bojicic,
Dominik J. Bomans,
Jordan D. Collier,
Evan J. Crawford,
Andrew M. Hopkins,
Kanapathippillai Jeganathan,
Patrick J. Kavanagh,
Bärbel S. Koribalski,
Denis Leahy,
Pierre Maggi,
Chandreyee Maitra,
Josh Marvil,
Michał J. Michałowski,
Ray P. Norris
, et al. (6 additional authors not shown)
Abstract:
We present an analysis of a new 120 deg$^{2}$ radio continuum image of the Large Magellanic Cloud (LMC) at 888 MHz with a bandwidth of 288 MHz and beam size of $13\rlap{.}^{\prime\prime}9\times12\rlap{.}^{\prime\prime}1$, from the Australian Square Kilometre Array Pathfinder (ASKAP) processed as part of the Evolutionary Map of the Universe (EMU) survey. The median Root Mean Squared noise is 58…
▽ More
We present an analysis of a new 120 deg$^{2}$ radio continuum image of the Large Magellanic Cloud (LMC) at 888 MHz with a bandwidth of 288 MHz and beam size of $13\rlap{.}^{\prime\prime}9\times12\rlap{.}^{\prime\prime}1$, from the Australian Square Kilometre Array Pathfinder (ASKAP) processed as part of the Evolutionary Map of the Universe (EMU) survey. The median Root Mean Squared noise is 58 $μ$Jy beam$^{-1}$. We present a catalogue of 54,612 sources, divided over a GOLD list (30,866 sources) complete down to 0.5 mJy uniformly across the field, a SILVER list (22,080 sources) reaching down to $<$ 0.2 mJy and a BRONZE list (1,666 sources) of visually inspected sources in areas of high noise and/or near bright complex emission. We discuss detections of planetary nebulae and their radio luminosity function, young stellar objects showing a correlation between radio luminosity and gas temperature, novae and X-ray binaries in the LMC, and active stars in the Galactic foreground that may become a significant population below this flux level. We present examples of diffuse emission in the LMC (H II regions, supernova remnants, bubbles) and distant galaxies showcasing spectacular interaction between jets and intracluster medium. Among 14,333 infrared counterparts of the predominantly background radio source population we find that star-forming galaxies become more prominent below 3 mJy compared to active galactic nuclei. We combine the new 888 MHz data with archival Australia Telescope Compact Array data at 1.4 GHz to determine spectral indices; the vast majority display synchrotron emission but flatter spectra occur too. We argue that the most extreme spectral index values are due to variability.
△ Less
Submitted 22 June, 2021;
originally announced June 2021.
-
An ACA 1mm survey of HzRGs in the ELAIS-S1: survey description and first results
Authors:
Hugo Messias,
Evanthia Hatziminaoglou,
Pascale Hibon,
Tony Mroczkowski,
Israel Matute,
Mark Lacy,
Brian Mason,
Sergio Martín,
José M. Afonso,
Edward Fomalont,
Stergios Amarantidis,
Sonia Antón,
Ricardo Demarco,
Marie-Lou Gendron-Marsolais,
Andrew M. Hopkins,
Rüdiger Kneissl,
Cristian Lopez,
David Rebolledo,
Chentao Yang
Abstract:
Radio-emitting jets might be one of the main ingredients sha** the evolution of massive galaxies in the Universe since early cosmic times. However, identifying early radio active galactic nuclei (AGN) and confirming this scenario has been hard to accomplish, with studies of samples of radio AGN hosts at z>2 becoming routinely possible only recently. With the above in mind, we have carried out a…
▽ More
Radio-emitting jets might be one of the main ingredients sha** the evolution of massive galaxies in the Universe since early cosmic times. However, identifying early radio active galactic nuclei (AGN) and confirming this scenario has been hard to accomplish, with studies of samples of radio AGN hosts at z>2 becoming routinely possible only recently. With the above in mind, we have carried out a survey with the Atacama Compact Array (ACA, or Morita Array) at 1.3 mm (rms=0.15 mJy) of 36 high-redshift radio AGN candidates found within 3.9deg2 in the ELAIS-S1 field. The work presented here describes the survey and showcases a preliminary set of results. The selection of the sample was based on three criteria making use of infrared (IR) and radio fluxes only. The criterion providing the highest selection rate of high-redshift sources (86% at z>0.8) is one combining an IR colour cut and radio flux cut (S(5.8um)/S(3.6um)>1.3 and S(1.4GHz)>1mJy). Among the sample of 36 sources, 16 show a millimetre (mm) detection. In eight of these cases, the emission has a non-thermal origin. A zsp=1.58 object, with a mm detection of non-thermal origin, shows a clear spatial offset between the jet-dominated mm continuum emission and that of the host's molecular gas, as traced by serendipitously detected CO(5-4) emission. Among the objects with serendipitous line detections there is a source with a narrow jet-like region, as revealed by CS(6-5) emission stretching 20kpc out of the host galaxy.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
Secure (S)Hell: Introducing an SSH Deception Proxy Framework
Authors:
Daniel Reti,
David Klaaßen,
Simon Duque Anton,
Hans Dieter Schotten
Abstract:
Deceiving an attacker in the network security domain is a well established approach, mainly achieved through deployment of honeypots consisting of open network ports with the sole purpose of raising an alert on a connection. With attackers becoming more careful to avoid honeypots, other decoy elements on real host systems continue to create uncertainty for attackers. This uncertainty makes an atta…
▽ More
Deceiving an attacker in the network security domain is a well established approach, mainly achieved through deployment of honeypots consisting of open network ports with the sole purpose of raising an alert on a connection. With attackers becoming more careful to avoid honeypots, other decoy elements on real host systems continue to create uncertainty for attackers. This uncertainty makes an attack more difficult, as an attacker cannot be sure whether the system does contain deceptive elements or not. Consequently, each action of an attacker could lead to the discovery. In this paper a framework is proposed for placing decoy elements through an SSH proxy, allowing to deploy decoy elements on-the-fly without the need for a modification of the protected host system.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Investigating the Ecosystem of Offensive Information Security Tools
Authors:
Simon D Duque Anton,
Daniel Fraunholz,
Daniel Schneider
Abstract:
The internet landscape is growing and at the same time becoming more heterogeneous. Services are performed via computers and networks, critical data is stored digitally. This enables freedom for the user, and flexibility for operators. Data is easier to manage and distribute. However, every device connected to a network is potentially susceptible to cyber attacks. Security solutions, such as antiv…
▽ More
The internet landscape is growing and at the same time becoming more heterogeneous. Services are performed via computers and networks, critical data is stored digitally. This enables freedom for the user, and flexibility for operators. Data is easier to manage and distribute. However, every device connected to a network is potentially susceptible to cyber attacks. Security solutions, such as antivirus software or firewalls, are widely established. However, certain types of attacks cannot be prevented with defensive measures alone. Offensive security describes the practice of security professionals using methods and tools of cyber criminals. This allows them to find vulnerabilities before they become the point of entry in a real attack. Furthermore, following the methods of cyber criminals enables security professionals to adapt to a criminal's point of view and potentially discover attack angles formerly ignored. As cyber criminals often employ freely available security tools, having knowledge about these provides additional insight for professionals. This work categorises and compares tools regarding metrics concerning maintainability, usability and technical details. Generally, several well-established tools are available for the first phases, while phases after the initial breach lack a variety of tools.
△ Less
Submitted 16 December, 2020;
originally announced December 2020.
-
Observations of the gamma-ray emitting narrow-line Seyfert 1, SBS 0846+513, and its host galaxy
Authors:
Timothy S. Hamilton,
Marco Berton,
Sonia Antón,
Lorenzo Busoni,
Alessandro Caccianiga,
Stefano Ciroi,
Wolfgang Gässler,
Iskren Georgiev,
Emilia Järvelä,
S. Komossa,
Smita Mathur,
Sebastian Rabien
Abstract:
The gamma-ray emitting galaxy SBS 0846+513 has been classified as a Narrow-Line Seyfert 1 from its spectroscopy, and on that basis it was thought likely to have a small central black hole hosted in a spiral galaxy. But very few of the gamma-ray Narrow-Line Seyfert 1s have high-resolution imaging of their hosts, so it is unknown how those expectations hold up for the gamma-emitting class. We have o…
▽ More
The gamma-ray emitting galaxy SBS 0846+513 has been classified as a Narrow-Line Seyfert 1 from its spectroscopy, and on that basis it was thought likely to have a small central black hole hosted in a spiral galaxy. But very few of the gamma-ray Narrow-Line Seyfert 1s have high-resolution imaging of their hosts, so it is unknown how those expectations hold up for the gamma-emitting class. We have observed this galaxy in the J-band with the Large Binocular Telescope's LUCI1 camera and the ARGOS adaptive optics system. We estimate its black hole mass to lie between $7.70 \leq \log \frac{\text{M}}{\text{M}_\odot} \leq 8.19$, using the correlation with bulge luminosity, or $7.96 \leq \log \frac{\text{M}}{\text{M}_\odot} \leq 8.16$ using the correlation with Sérsic index, putting its mass at the high end of the Narrow Line Seyfert 1 range. These estimates are independent of the Broad Line Region viewing geometry and avoid underestimates due to looking down the jet axis. Its host shows evidence of a bulge + disc structure, both from two-dimensional modeling and isophote shape, in kee** with the expectations. Mergers and interactions appear to be common among the gamma-ray Narrow-Line Seyfert 1s, and we see some circumstantial evidence for companion galaxies or disturbed features in the host.
△ Less
Submitted 14 November, 2020;
originally announced November 2020.
-
Creating it from SCRATCh: A Practical Approach for Enhancing the Security of IoT-Systems in a DevOps-enabled Software Development Environment
Authors:
Simon D Duque Anton,
Daniel Fraunholz,
Daniel Krohmer,
Daniel Reti,
Hans D Schotten,
Franklin Selgert,
Marcell Marosvölgyi,
Morten Larsen,
Krishna Sudhakar,
Tobias Koch,
Till Witt,
Cédric Bassem
Abstract:
DevOps describes a method to reorganize the way different disciplines in software engineering work together to speed up software delivery. However, the introduction of DevOps-methods to organisations is a complex task. A successful introduction results in a set of structured process descriptions. Despite the structure, this process leaves margin for error: Especially security issues are addressed…
▽ More
DevOps describes a method to reorganize the way different disciplines in software engineering work together to speed up software delivery. However, the introduction of DevOps-methods to organisations is a complex task. A successful introduction results in a set of structured process descriptions. Despite the structure, this process leaves margin for error: Especially security issues are addressed in individual stages, without consideration of the interdependence. Furthermore, applying DevOps-methods to distributed entities, such as the Internet of Things (IoT) is difficult as the architecture is tailormade for desktop and cloud resources. In this work, an overview of tooling employed in the stages of DevOps processes is introduced. Gaps in terms of security or applicability to the IoT are derived. Based on these gaps, solutions that are being developed in the course of the research project SCRATCh are presented and discussed in terms of benefit to DevOps-environments.
△ Less
Submitted 28 October, 2020;
originally announced October 2020.
-
Square Kilometre Array Science Data Challenge 1: analysis and results
Authors:
A. Bonaldi,
T. An,
M. Bruggen,
S. Burkutean,
B. Coelho,
H. Goodarzi,
P. Hartley,
P. K. Sandhu,
C. Wu,
L. Yu,
M. H. Zhoolideh Haghighi,
S. Anton,
Z. Bagheri,
D. Barbosa,
J. P. Barraca,
D. Bartashevich,
M. Bergano,
M. Bonato,
J. Brand,
F. de Gasperin,
A. Giannetti,
R. Dodson,
P. Jain,
S. Jaiswal,
B. Lao
, et al. (20 additional authors not shown)
Abstract:
As the largest radio telescope in the world, the Square Kilometre Array (SKA) will lead the next generation of radio astronomy. The feats of engineering required to construct the telescope array will be matched only by the techniques developed to exploit the rich scientific value of the data. To drive forward the development of efficient and accurate analysis methods, we are designing a series of…
▽ More
As the largest radio telescope in the world, the Square Kilometre Array (SKA) will lead the next generation of radio astronomy. The feats of engineering required to construct the telescope array will be matched only by the techniques developed to exploit the rich scientific value of the data. To drive forward the development of efficient and accurate analysis methods, we are designing a series of data challenges that will provide the scientific community with high-quality datasets for testing and evaluating new techniques. In this paper we present a description and results from the first such Science Data Challenge (SDC1). Based on SKA MID continuum simulated observations and covering three frequencies (560 MHz, 1400MHz and 9200 MHz) at three depths (8 h, 100 h and 1000 h), SDC1 asked participants to apply source detection, characterization and classification methods to simulated data. The challenge opened in November 2018, with nine teams submitting results by the deadline of April 2019. In this work we analyse the results for 8 of those teams, showcasing the variety of approaches that can be successfully used to find, characterise and classify sources in a deep, crowded field. The results also demonstrate the importance of building domain knowledge and expertise on this kind of analysis to obtain the best performance. As high-resolution observations begin revealing the true complexity of the sky, one of the outstanding challenges emerging from this analysis is the ability to deal with highly resolved and complex sources as effectively as the unresolved source population.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Intrusion Detection in Binary Process Data: Introducing the Hamming-distance to Matrix Profiles
Authors:
Simon D Duque Anton,
Hans Dieter Schotten
Abstract:
The digitisation of industry provides a plethora of novel applications that increase flexibility and reduce setup and maintenance time as well as cost. Furthermore, novel use cases are created by the digitisation of industry, commonly known as Industry 4.0 or the Industrial Internet of Things, applications make use of communication and computation technology that is becoming available. This enable…
▽ More
The digitisation of industry provides a plethora of novel applications that increase flexibility and reduce setup and maintenance time as well as cost. Furthermore, novel use cases are created by the digitisation of industry, commonly known as Industry 4.0 or the Industrial Internet of Things, applications make use of communication and computation technology that is becoming available. This enables novel business use cases, such as the digital twin, customer individual production, and data market places. However, the inter-connectivity such use cases rely on also significantly increases the attack surface of industrial enterprises. Sabotage and espionage are aimed at data, which is becoming the most crucial asset of an enterprise. Since the requirements on security solutions in industrial networks are inherently different from office networks, novel approaches for intrusion detection need to be developed. In this work, process data of a real water treatment process that contains attacks is analysed. Analysis is performed by an extension of Matrix Profiles, a motif discovery algorithm for time series. By extending Matrix Profiles with a Hammingdistance metric, binary and tertiary actuators can be integrated into the analysis in a meaningful fashion. This algorithm requires low training effort while providing accurate results. Furthermore, it can be employed in a real-time fashion. Selected actuators in the data set are analysed to highlight the applicability of the extended Matrix Profiles.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
Portuguese SKA White Book
Authors:
Domingos Barbosa,
Sonia Antón,
João Paulo Barraca,
Miguel Bergano,
Alexandre C. M. Correia,
Dalmiro Maia,
Valério A. R. M. Ribeiro
Abstract:
This white book stems from the contributions presented at the Portuguese SKA Days, held on the 6th and 7th February 2018 with the presence of the SKA Deputy Director General Alistair McPherson and the SKA Science Director Robert Braun. This initiative was held to promote the Square Kilometer Array (SKA) - the world's largest radio telescope - among the Portuguese scientific and business communitie…
▽ More
This white book stems from the contributions presented at the Portuguese SKA Days, held on the 6th and 7th February 2018 with the presence of the SKA Deputy Director General Alistair McPherson and the SKA Science Director Robert Braun. This initiative was held to promote the Square Kilometer Array (SKA) - the world's largest radio telescope - among the Portuguese scientific and business communities with support from the Portuguese Science and Technology Foundation (FCT) with the contribution of Portuguese policy makers and researchers. The meeting was very successful in providing a detailed overview of the SKA status, vision and goals and describes most of the Portuguese contributions to science, technology and the related industry aspirations
△ Less
Submitted 3 May, 2020;
originally announced May 2020.
-
Security in Process: Visually Supported Triage Analysis in Industrial Process Data
Authors:
Anna-Pia Lohfink,
Simon D. Duque Anton,
Hans Dieter Schotten,
Heike Leitte,
Christoph Garth
Abstract:
Operation technology networks, i.e. hard- and software used for monitoring and controlling physical/industrial processes, have been considered immune to cyber attacks for a long time. A recent increase of attacks in these networks proves this assumption wrong. Several technical constraints lead to approaches to detect attacks on industrial processes using available sensor data. This setting differ…
▽ More
Operation technology networks, i.e. hard- and software used for monitoring and controlling physical/industrial processes, have been considered immune to cyber attacks for a long time. A recent increase of attacks in these networks proves this assumption wrong. Several technical constraints lead to approaches to detect attacks on industrial processes using available sensor data. This setting differs fundamentally from anomaly detection in IT-network traffic and requires new visualization approaches adapted to the common periodical behavior in OT-network data. We present a tailored visualization system that utilizes inherent features of measurements from industrial processes to full capacity to provide insight into the data and support triage analysis by laymen and experts. The novel combination of spiral plots with results from anomaly detection was implemented in an interactive system. The capabilities of our system are demonstrated using sensor and actuator data from a real-world water treatment process with introduced attacks. Exemplary analysis strategies are presented. Finally, we evaluate effectiveness and usability of our system and perform an expert evaluation.
△ Less
Submitted 23 July, 2021; v1 submitted 10 December, 2019;
originally announced December 2019.
-
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay
Authors:
Simon D. Duque Anton,
Anna Pia Lohfink,
Hans Dieter Schotten
Abstract:
The fourth industrial revolution leads to an increased use of embedded computation and intercommunication in an industrial environment. While reducing cost and effort for set up, operation and maintenance, and increasing the time to operation or market respectively as well as the efficiency, this also increases the attack surface of enterprises. Industrial enterprises have become targets of cyber…
▽ More
The fourth industrial revolution leads to an increased use of embedded computation and intercommunication in an industrial environment. While reducing cost and effort for set up, operation and maintenance, and increasing the time to operation or market respectively as well as the efficiency, this also increases the attack surface of enterprises. Industrial enterprises have become targets of cyber criminals in the last decade, reasons being espionage but also politically motivated. Infamous attack campaigns as well as easily available malware that hits industry in an unprepared state create a large threat landscape. As industrial systems often operate for many decades and are difficult or impossible to upgrade in terms of security, legacy-compatible industrial security solutions are necessary in order to create a security parameter. One plausible approach in industry is the implementation and employment of side-channel sensors. Combining readily available sensor data from different sources via different channels can provide an enhanced insight about the security state. In this work, a data set of an experimental industrial set up containing side channel sensors is discussed conceptually and insights are derived.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Security in Process: Detecting Attacks in Industrial Process Data
Authors:
Simon D. Duque Anton,
Anna Pia Lohfink,
Christoph Garth,
Hans Dieter Schotten
Abstract:
Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. Howeve…
▽ More
Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. However, this progress comes at the cost of an enlarged attack surface of industrial companies. Operational networks that have previously been phyiscally separated from public networks are now connected in order to make use of new communication capabilites. This motivates the need for industrial intrusion detection solutions that are compatible to the long-term operation machines in industry as well as the heterogeneous and fast-changing networks. In this work, process data is analysed. The data is created and monitored on real-world hardware. After a set up phase, attacks are introduced into the systems that influence the process behaviour. A time series-based anomaly detection approach, the Matrix Profiles, are adapted to the specific needs and applied to the intrusion detection. The results indicate an applicability of these methods to detect attacks in the process behaviour. Furthermore, they are easily integrated into existing process environments. Additionally, one-class classifiers One-Class Support Vector Machines and Isolation Forest are applied to the data without a notion of timing. While Matrix Profiles perform well in terms of creating and visualising results, the one-class classifiers perform poorly.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests
Authors:
Simon D. Duque Anton,
Sapna Sinha,
Hans Dieter Schotten
Abstract:
Attacks on industrial enterprises are increasing in number as well as in effect. Since the introduction of industrial control systems in the 1970's, industrial networks have been the target of malicious actors. More recently, the political and warfare-aspects of attacks on industrial and critical infrastructure are becoming more relevant. In contrast to classic home and office IT systems, industri…
▽ More
Attacks on industrial enterprises are increasing in number as well as in effect. Since the introduction of industrial control systems in the 1970's, industrial networks have been the target of malicious actors. More recently, the political and warfare-aspects of attacks on industrial and critical infrastructure are becoming more relevant. In contrast to classic home and office IT systems, industrial IT, so-called OT systems, have an effect on the physical world. Furthermore, industrial devices have long operation times, sometimes several decades. Updates and fixes are tedious and often not possible. The threats on industry with the legacy requirements of industrial environments creates the need for efficient intrusion detection that can be integrated into existing systems. In this work, the network data containing industrial operation is analysed with machine learning- and time series- based anomaly detection algorithms in order to discover the attacks introduced to the data. Two different data sets are used, one Modbus-based gas pipeline control traffic and one OPC UA-based batch processing traffic. In order to detect attacks, two machine learning-based algorithms are used, namely \textit{SVM} and Random Forest. Both perform well, with Random Forest slightly outperforming SVM. Furthermore, extracting and selecting features as well as handling missing data is addressed in this work.
△ Less
Submitted 24 July, 2019;
originally announced July 2019.
-
All-sky Medium Energy Gamma-ray Observatory: Exploring the Extreme Multimessenger Universe
Authors:
Julie McEnery,
Juan Abel Barrio,
Ivan Agudo,
Marco Ajello,
José-Manuel Álvarez,
Stefano Ansoldi,
Sonia Anton,
Natalia Auricchio,
John B. Stephen,
Luca Baldini,
Cosimo Bambi,
Matthew Baring,
Ulisses Barres,
Denis Bastieri,
John Beacom,
Volker Beckmann,
Wlodek Bednarek,
Denis Bernard,
Elisabetta Bissaldi,
Peter Bloser,
Harsha Blumer,
Markus Boettcher,
Steven Boggs,
Aleksey Bolotnikov,
Eugenio Bottacini
, et al. (160 additional authors not shown)
Abstract:
The All-sky Medium Energy Gamma-ray Observatory (AMEGO) is a probe class mission concept that will provide essential contributions to multimessenger astrophysics in the late 2020s and beyond. AMEGO combines high sensitivity in the 200 keV to 10 GeV energy range with a wide field of view, good spectral resolution, and polarization sensitivity. Therefore, AMEGO is key in the study of multimessenger…
▽ More
The All-sky Medium Energy Gamma-ray Observatory (AMEGO) is a probe class mission concept that will provide essential contributions to multimessenger astrophysics in the late 2020s and beyond. AMEGO combines high sensitivity in the 200 keV to 10 GeV energy range with a wide field of view, good spectral resolution, and polarization sensitivity. Therefore, AMEGO is key in the study of multimessenger astrophysical objects that have unique signatures in the gamma-ray regime, such as neutron star mergers, supernovae, and flaring active galactic nuclei. The order-of-magnitude improvement compared to previous MeV missions also enables discoveries of a wide range of phenomena whose energy output peaks in the relatively unexplored medium-energy gamma-ray band.
△ Less
Submitted 25 November, 2019; v1 submitted 17 July, 2019;
originally announced July 2019.
-
Using Temporal and Topological Features for Intrusion Detection in Operational Networks
Authors:
Simon D. Duque Anton,
Daniel Fraunholz,
Hans Dieter Schotten
Abstract:
Until two decades ago, industrial networks were deemed secure due to physical separation from public networks. An abundance of successful attacks proved that assumption wrong. Intrusion detection solutions for industrial application need to meet certain requirements that differ from home- and office-environments, such as working without feedback to the process and compatibility with legacy systems…
▽ More
Until two decades ago, industrial networks were deemed secure due to physical separation from public networks. An abundance of successful attacks proved that assumption wrong. Intrusion detection solutions for industrial application need to meet certain requirements that differ from home- and office-environments, such as working without feedback to the process and compatibility with legacy systems. Industrial systems are commonly used for several decades, updates are often difficult and expensive. Furthermore, most industrial protocols do not have inherent authentication or encryption mechanisms, allowing for easy lateral movement of an intruder once the perimeter is breached. In this work, an algorithm for motif discovery in time series, Matrix Profiles, is used to detect outliers in the timing behaviour of an industrial process. This process was monitored in an experimental environment, containing ground truth labels after attacks were performed. Furthermore, the graph representations of a different industrial data set that has been emulated are used to detect malicious activities. These activities can be derived from anomalous communication patterns, represented as edges in the graph. Finally, an integration concept for both methods is proposed.
△ Less
Submitted 9 July, 2019;
originally announced July 2019.
-
Highly Scalable and Flexible Model for Effective Aggregation of Context-based Data in Generic IIoT Scenarios
Authors:
Simon Duque Anton,
Daniel Fraunholz,
Janis Zemitis,
Frederic Pohl,
Hans Dieter Schotten
Abstract:
Interconnectivity of production machines is a key feature of the Industrial Internet of Things (IIoT). This feature allows for many advantages in producing. Configuration and maintenance gets easier, as access to the given production unit is not necessarily coupled to physical presence. Customized production of goods is easily possible, reducing production times and increasing throughput. There ar…
▽ More
Interconnectivity of production machines is a key feature of the Industrial Internet of Things (IIoT). This feature allows for many advantages in producing. Configuration and maintenance gets easier, as access to the given production unit is not necessarily coupled to physical presence. Customized production of goods is easily possible, reducing production times and increasing throughput. There are, however, also dangers to the increasing talkativeness of industrial production machines. The more open a system is, the more points of entry for an attacker exist. Furthermore, the amount of data a production site also increases rapidly due to the integrated intelligence and interconnectivity. To keep track of this data in order to detect attacks and errors in the production site, it is necessary to smartly aggregate and evaluate the data. In this paper, we present a new approach for collecting, aggregating and analysing data from different sources and on three different levels of abstraction. Our model is event-centric, considering every occurrence of information inside the system as an event. In the lowest level of abstraction, singular packets are collected, correlated with log-entries and analysed. On the highest level of abstraction, networks are pictured as a connectivity graph, enriched with information about host-based activities. Furthermore, we describe our work in progress of evaluating our aggregation model on two different system settings. In the first scenario, we verify the usability of our model in a remote maintenance application. In the second scenario, we evaluate our model in the context of network sniffing and correlation with log-files. First results show that our model is a promising solution to cope with increasing amounts of data and to correlate information from different types of sources.
△ Less
Submitted 28 May, 2019;
originally announced June 2019.
-
Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods
Authors:
Simon Duque Antón,
Michael Gundall,
Daniel Fraunholz,
Hans Dieter Schotten
Abstract:
There are hardly any data sets publicly available that can be used to evaluate intrusion detection algorithms. The biggest threat for industrial applications arises from state-sponsored and criminal groups. Often, formerly unknown exploits are employed by these attackers, so-called 0-day exploits. They cannot be discovered with signature-based intrusion detection. Thus, statistical or machine lear…
▽ More
There are hardly any data sets publicly available that can be used to evaluate intrusion detection algorithms. The biggest threat for industrial applications arises from state-sponsored and criminal groups. Often, formerly unknown exploits are employed by these attackers, so-called 0-day exploits. They cannot be discovered with signature-based intrusion detection. Thus, statistical or machine learning based anomaly detection lends itself readily. These methods especially, however, need a large amount of labelled training data. In this work, an exemplary industrial use case with real-world industrial hardware is presented. Siemens S7 Programmable Logic Controllers are used to control a real world-based control application using the OPC UA protocol: A pump, filling and emptying water tanks. This scenario is used to generate application specific network data. Furthermore, attacks are introduced into this data set. This is done in three ways: First, the normal process is monitored and captured. Common attacks are then synthetically introduced into this data set. Second, malicious behaviour is implemented on the Programmable Logic Controller program and executed live, the traffic is captured as well. Third, malicious behaviour is implemented on the Programmable Logic Controller while still kee** the same output behaviour as in normal operation. An attacker could exploit an application but forge valid sensor output so that no anomaly is detected. Sensors are employed, capturing temperature, sound and flow of water to create data that can be correlated to the network data and used to still detect the attack. All data is labelled, containing the ground truth, meaning all attacks are known and no unknown attacks occur. This makes them perfect for training of anomaly detection algorithms. The data is published to enable security researchers to evaluate intrusion detection solutions.
△ Less
Submitted 28 May, 2019;
originally announced May 2019.
-
Putting Things in Context: Securing Industrial Authentication with Context Information
Authors:
Simon Duque Anton,
Daniel Fraunholz,
Christoph Lipps,
Khurshid Alam,
Hans Dieter Schotten
Abstract:
The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while pr…
▽ More
The development in the area of wireless communication, mobile and embedded computing leads to significant changes in the application of devices. Over the last years, embedded devices were brought into the consumer area creating the Internet of Things. Furthermore, industrial applications increasingly rely on communication through trust boundaries. Networking is cheap and easily applicable while providing the possibility to make everyday life more easy and comfortable and industry more efficient and less time-consuming. One of the crucial parts of this interconnected world is sound and secure authentication of entities. Only entities with valid authorisation should be enabled to act on a resource according to an access control scheme. An overview of challenges and practices of authentication is provided in this work, with a special focus on context information as part of security solutions. It can be used for authentication and security solutions in industrial applications. Additional information about events in networks can aid intrusion detection, especially in combination with security information and event management systems. Finally, an authentication and access control approach, based on context information and - depending on the scenario - multiple factors is presented. The combination of multiple factors with context information makes it secure and at the same time case adaptive, so that the effort always matches, but never exceeds, the security demand. This is a common issue of standard cyber security, entities having to obey strict, inflexible and unhandy policies. This approach has been implemented exemplary based on RADIUS. Different scenarios were considered, showing that this approach is capable of providing flexible and scalable security for authentication processes.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set
Authors:
Simon Duque Anton,
Suneetha Kanoor,
Daniel Fraunholz,
Hans Dieter Schotten
Abstract:
In the context of the Industrial Internet of Things, communication technology, originally used in home and office environments, is introduced into industrial applications. Commercial off-the-shelf products, as well as unified and well-established communication protocols make this technology easy to integrate and use. Furthermore, productivity is increased in comparison to classic industrial contro…
▽ More
In the context of the Industrial Internet of Things, communication technology, originally used in home and office environments, is introduced into industrial applications. Commercial off-the-shelf products, as well as unified and well-established communication protocols make this technology easy to integrate and use. Furthermore, productivity is increased in comparison to classic industrial control by making systems easier to manage, set up and configure. Unfortunately, most attack surfaces of home and office environments are introduced into industrial applications as well, which usually have very few security mechanisms in place. Over the last years, several technologies tackling that issue have been researched. In this work, machine learning-based anomaly detection algorithms are employed to find malicious traffic in a synthetically generated data set of Modbus/TCP communication of a fictitious industrial scenario. The applied algorithms are Support Vector Machine (SVM), Random Forest, k-nearest neighbour and k-means clustering. Due to the synthetic data set, supervised learning is possible. Support Vector Machine and k-nearest neighbour perform well with different data sets, while k-nearest neighbour and k-means clustering do not perform satisfactorily.
△ Less
Submitted 28 May, 2019;
originally announced May 2019.
-
The Dos and Don'ts of Industrial Network Simulation: A Field Report
Authors:
Simon Duque Anton,
Daniel Fraunholz,
Dennis Krummacker,
Christoph Fischer,
Michael Karrenbauer,
Hans Dieter Schotten
Abstract:
Advances in industrial control lead to increasing incorporation of intercommunication technologies and embedded devices into the production environment. In addition to that, the rising complexity of automation tasks creates demand for extensive solutions. Standardised protocols and commercial off the shelf devices aid in providing these solutions. Still, setting up industrial communication network…
▽ More
Advances in industrial control lead to increasing incorporation of intercommunication technologies and embedded devices into the production environment. In addition to that, the rising complexity of automation tasks creates demand for extensive solutions. Standardised protocols and commercial off the shelf devices aid in providing these solutions. Still, setting up industrial communication networks is a tedious and high effort task. This justifies the need for simulation environments in the industrial context, as they provide cost-, resource- and time-efficient evaluation of solution approaches. In this work, industrial use cases are identified and the according requirements are derived. Furthermore, available simulation and emulation tools are analysed. They are mapped onto the requirements of industrial applications, so that an expressive assignment of solutions to application domains is given.
△ Less
Submitted 28 May, 2019;
originally announced May 2019.
-
A Question of Context: Enhancing Intrusion Detection by Providing Context Information
Authors:
Simon Duque Anton,
Daniel Fraunholz,
Stephan Teuber,
Hans Dieter Schotten
Abstract:
Due to the fourth industrial revolution, and the resulting increase in interconnectivity, industrial networks are more and more opened to publicly available networks. Apart from the huge benefit in manageability and flexibility, the openness also results in a larger attack surface for malicious adversaries. In comparison to office environments, industrial networks have very high volumes of data. I…
▽ More
Due to the fourth industrial revolution, and the resulting increase in interconnectivity, industrial networks are more and more opened to publicly available networks. Apart from the huge benefit in manageability and flexibility, the openness also results in a larger attack surface for malicious adversaries. In comparison to office environments, industrial networks have very high volumes of data. In addition to that, every delay will most likely lead to loss of revenue. Hence, intrusion detection systems for industrial applications have different requirements than office-based intrusion detection systems. On the other hand, industrial networks are able to provide a lot of contextual information due to manufacturing execution systems and enterprise resource planning. Additionally, industrial networks tend to be more uniform, making it easier to determine outliers. In this work, an abstract simulation of industrial network behaviour is created. Malicious actions are introduced into a set of sequences of valid behaviour. Finally, a context-based and context-less intrusion detection system is used to find the attacks. The results are compared and commented. It can be seen that context information can help in identifying malicious actions more reliable than intrusion detection with only one source of information, e.g. the network.
△ Less
Submitted 28 May, 2019;
originally announced May 2019.
-
Putting Together the Pieces: A Concept for Holistic Industrial Intrusion Detection
Authors:
Simon D. Duque Antón,
Hans Dieter Schotten
Abstract:
Besides the advantages derived from the ever present communication properties, it increases the attack surface of a network as well. As industrial protocols and systems were not designed with security in mind, spectacular attacks on industrial systems occurred over the last years. Most industrial communication protocols do not provide means to ensure authentication or encryption. This means attack…
▽ More
Besides the advantages derived from the ever present communication properties, it increases the attack surface of a network as well. As industrial protocols and systems were not designed with security in mind, spectacular attacks on industrial systems occurred over the last years. Most industrial communication protocols do not provide means to ensure authentication or encryption. This means attackers with access to a network can read and write information. Originally not meant to be connected to public networks, the use cases of Industry 4.0 require interconnectivity, often through insecure public networks. This lead to an increasing interest in information security products for industrial applications. In this work, the concept for holistic intrusion detection methods in an industrial context is presented. It is based on different works considering several aspects of industrial environments and their capabilities to identify intrusions as an anomaly in network or process data. These capabilities are based on preceding experiments on real and synthetic data. In order to justify the concept, an overview of potential and actual attack vectors and attacks on industrial systems is provided. It is shown that different aspects of industrial facilities, e.g. office IT, shop floor OT, firewalled connections to customers and partners are analysed as well as the different layers of the automation pyramid require different methods to detect attacks. Additionally, the singular steps of an attack on industrial applications are characterised. Finally, a resulting concept for integration of these methods is proposed, providing the means to detect the different stages of an attack by different means.
△ Less
Submitted 28 May, 2019;
originally announced May 2019.
-
Devil in the Detail: Attack Scenarios in Industrial Applications
Authors:
Simon D. Duque Anton,
Alexander Hafner,
Hans Dieter Schotten
Abstract:
In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was obser…
▽ More
In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was observed, with drastic consequences on the physical work. In this work, attack vectors on industrial networks are categorised. A real-world process is simulated, attacks are then introduced. Finally, two machine learning-based methods for time series anomaly detection are employed to detect the attacks. Matrix Profiles are employed more successfully than a predictor Long Short-Term Memory network, a class of neural networks.
△ Less
Submitted 24 May, 2019;
originally announced May 2019.
-
Two Decades of SCADA Exploitation: A Brief History
Authors:
Simon Duque Anton,
Daniel Fraunholz,
Christoph Lipps,
Frederic Pohl,
Marc Zimmermann,
Hans D. Schotten
Abstract:
Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early 2000's industrial networks were opened to the public internet. The reasons were mani…
▽ More
Since the early 1960, industrial process control has been applied by electric systems. In the mid 1970's, the term SCADA emerged, describing the automated control and data acquisition. Since most industrial and automation networks were physically isolated, security was not an issue. This changed, when in the early 2000's industrial networks were opened to the public internet. The reasons were manifold. Increased interconnectivity led to more productivity, simplicity and ease of use. It decreased the configuration overhead and downtimes for system adjustments. However, it also led to an abundance of new attack vectors. In recent time, there has been a remarkable amount of attacks on industrial companies and infrastructures. In this paper, known attacks on industrial systems are analysed. This is done by investigating the exploits that are available on public sources. The different types of attacks and their points of entry are reviewed in this paper. Trends in exploitation as well as targeted attack campaigns against industrial enterprises are introduced.
△ Less
Submitted 21 May, 2019;
originally announced May 2019.
-
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection
Authors:
Simon D. Duque Anton,
Mathias Strufe,
Hans Dieter Schotten
Abstract:
The concept of Industry 4.0 brings a disruption into the processing industry. It is characterised by a high degree of intercommunication, embedded computation, resulting in a decentralised and distributed handling of data. Additionally, cloud-storage and Software-as-a-Service (SaaS) approaches enhance a centralised storage and handling of data. This often takes place in third-party networks. Furth…
▽ More
The concept of Industry 4.0 brings a disruption into the processing industry. It is characterised by a high degree of intercommunication, embedded computation, resulting in a decentralised and distributed handling of data. Additionally, cloud-storage and Software-as-a-Service (SaaS) approaches enhance a centralised storage and handling of data. This often takes place in third-party networks. Furthermore, Industry 4.0 is driven by novel business cases. Lot sizes of one, customer individual production, observation of process state and progress in real-time and remote maintenance, just to name a few. All of these new business cases make use of the novel technologies. However, cyber security has not been an issue in industry. Industrial networks have been considered physically separated from public networks. Additionally, the high level of uniqueness of any industrial network was said to prevent attackers from exploiting flaws. Those assumptions are inherently broken by the concept of Industry 4.0. As a result, an abundance of attack vectors is created. In the past, attackers have used those attack vectors in spectacular fashions. Especially Small and Mediumsized Enterprises (SMEs) in Germany struggle to adapt to these challenges. Reasons are the cost required for technical solutions and security professionals. In order to enable SMEs to cope with the growing threat in the cyberspace, the research project IUNO Insec aims at providing and improving security solutions that can be used without specialised security knowledge. The project IUNO Insec is briefly introduced in this work. Furthermore, contributions in the field of intrusion detection, especially machine learning-based solutions, for industrial environments provided by the authors are presented and set into context.
△ Less
Submitted 16 May, 2019; v1 submitted 15 May, 2019;
originally announced May 2019.
-
High-Energy Polarimetry - a new window to probe extreme physics in AGN jets
Authors:
B. Rani,
H. Zhang,
S. D. Hunter,
F. Kislat,
M. Böttcher,
J. E. McEnery,
D. J. Thompson,
D. Giannios,
F. Guo,
H. Li,
M. Baring,
I. Agudo,
S. Buson,
M. Petropoulou,
V. Pavlidou,
E. Angelakis,
I. Myserlis,
Z. Wadiasingh,
R. M. Curado da Silva,
P. Kilian,
S. Guiriec,
V. V. Bozhilov,
J. Hodgson,
S. Antón,
D. Kazanas
, et al. (9 additional authors not shown)
Abstract:
The constantly improving sensitivity of ground-based and space-borne observatories has made possible the detection of high-energy emission (X-rays and gamma-rays) from several thousands of extragalactic sources. Enormous progress has been made in measuring the continuum flux enabling us to perform imaging, spectral and timing studies. An important remaining challenge for high-energy astronomy is m…
▽ More
The constantly improving sensitivity of ground-based and space-borne observatories has made possible the detection of high-energy emission (X-rays and gamma-rays) from several thousands of extragalactic sources. Enormous progress has been made in measuring the continuum flux enabling us to perform imaging, spectral and timing studies. An important remaining challenge for high-energy astronomy is measuring polarization. The capability to measure polarization is being realized currently at X-ray energies (e.g. with IXPE), and sensitive gamma-ray telescopes capable of measuring polarization, such as AMEGO, AdEPT, e-ASTROGAM, etc., are being developed. These future gamma-ray telescopes will probe the radiation mechanisms and magnetic fields of relativistic jets from active galactic nuclei at spatial scales much smaller than the angular resolution achieved with continuum observations of the instrument. In this white paper, we discuss the scientific potentials of high-energy polarimetry, especially gamma-ray polarimetry, including the theoretical implications, and observational technology advances being made. In particular, we will explore the primary scientific opportunities and wealth of information expected from synergy of multi-wavelength polarimetry that will be brought to multi-messenger astronomy.
△ Less
Submitted 11 March, 2019;
originally announced March 2019.
-
The space density of z>4 blazars
Authors:
Alessandro Caccianiga,
Alberto Moretti,
Silvia Belladitta,
Roberto Della Ceca,
Sonia Antón,
Lucia Ballo,
Claudia Cicone,
Daniele Dallacasa,
Adriana Gargiulo,
Luca Ighina,
Maria J. Marchã,
Paola Severgnini
Abstract:
High redshift blazars are an important class of Active Galactic Nuclei (AGN) that can provide an independent estimate of the supermassive black-hole mass function in high redshift radio-loud AGN without the bias due to absorption along the line-of-sight. Using the Cosmic Lens All Sky Survey (CLASS) we built a complete radio flux-limited sample of high redshift (z>4) blazars suitable for statistica…
▽ More
High redshift blazars are an important class of Active Galactic Nuclei (AGN) that can provide an independent estimate of the supermassive black-hole mass function in high redshift radio-loud AGN without the bias due to absorption along the line-of-sight. Using the Cosmic Lens All Sky Survey (CLASS) we built a complete radio flux-limited sample of high redshift (z>4) blazars suitable for statistical studies. By combining dedicated optical observations and the SDSS spectroscopic database, we obtained a sample of 26 blazar candidates with a spectroscopic redshift above 4. On the basis of their radio spectrum we distinguish between blazars and QSO with a Gigahertz Peaked Spectrum (GPS) like spectrum. Out of the 18 confirmed blazars 14 constitute a completely identified, flux-limited sample down to a magnitude of 21 (AB). Using this complete sample we derive a space density of blazars with 4<z<5.5 of rho=0.13 (+0.05,-0.03) Gpc^-3. This is the first actual estimate of the blazar space density in this range of redshift. This value is in good agreement with the extrapolation of the luminosity function and cosmological evolution based on a sample of flat-spectrum radio quasars selected at lower redshifts and it is consistent with a cosmological evolution peaking at z$\sim$2 similar to radio-quiet QSO. We do not confirm, instead, the presence of a peak at z~4 in the space density evolution, recently suggested using an X-ray selected sample of blazars. It is possible that this extreme peak of the evolution is present only among the most luminous blazars.
△ Less
Submitted 9 January, 2019;
originally announced January 2019.
-
The Compact Linear Collider (CLIC) - 2018 Summary Report
Authors:
The CLIC,
CLICdp collaborations,
:,
T. K. Charles,
P. J. Giansiracusa,
T. G. Lucas,
R. P. Rassool,
M. Volpi,
C. Balazs,
K. Afanaciev,
V. Makarenko,
A. Patapenka,
I. Zhuk,
C. Collette,
M. J. Boland,
A. C. Abusleme Hoffman,
M. A. Diaz,
F. Garay,
Y. Chi,
X. He,
G. Pei,
S. Pei,
G. Shu,
X. Wang,
J. Zhang
, et al. (671 additional authors not shown)
Abstract:
The Compact Linear Collider (CLIC) is a TeV-scale high-luminosity linear $e^+e^-$ collider under development at CERN. Following the CLIC conceptual design published in 2012, this report provides an overview of the CLIC project, its current status, and future developments. It presents the CLIC physics potential and reports on design, technology, and implementation aspects of the accelerator and the…
▽ More
The Compact Linear Collider (CLIC) is a TeV-scale high-luminosity linear $e^+e^-$ collider under development at CERN. Following the CLIC conceptual design published in 2012, this report provides an overview of the CLIC project, its current status, and future developments. It presents the CLIC physics potential and reports on design, technology, and implementation aspects of the accelerator and the detector. CLIC is foreseen to be built and operated in stages, at centre-of-mass energies of 380 GeV, 1.5 TeV and 3 TeV, respectively. CLIC uses a two-beam acceleration scheme, in which 12 GHz accelerating structures are powered via a high-current drive beam. For the first stage, an alternative with X-band klystron powering is also considered. CLIC accelerator optimisation, technical developments and system tests have resulted in an increased energy efficiency (power around 170 MW) for the 380 GeV stage, together with a reduced cost estimate at the level of 6 billion CHF. The detector concept has been refined using improved software tools. Significant progress has been made on detector technology developments for the tracking and calorimetry systems. A wide range of CLIC physics studies has been conducted, both through full detector simulations and parametric studies, together providing a broad overview of the CLIC physics potential. Each of the three energy stages adds cornerstones of the full CLIC physics programme, such as Higgs width and couplings, top-quark properties, Higgs self-coupling, direct searches, and many precision electroweak measurements. The interpretation of the combined results gives crucial and accurate insight into new physics, largely complementary to LHC and HL-LHC. The construction of the first CLIC energy stage could start by 2026. First beams would be available by 2035, marking the beginning of a broad CLIC physics programme spanning 25-30 years.
△ Less
Submitted 6 May, 2019; v1 submitted 14 December, 2018;
originally announced December 2018.
-
Baryon acoustic oscillations from Integrated Neutral Gas Observations: Radio frequency interference measurements and telescope site selection
Authors:
M. W. Peel,
C. A. Wuensche,
E. Abdalla,
S. Anton,
L. Barosi,
I. W. A. Browne,
M. Caldas,
C. Dickinson,
K. S. F. Fornazier,
C. Monstein,
C. Strauss,
G. Tancredi,
T. Villela
Abstract:
The Baryon acoustic oscillations from Integrated Neutral Gas Observations (BINGO) telescope is a new 40-m class radio telescope to measure the large-angular-scale intensity of Hi emission at 980-1260 MHz to constrain dark energy parameters. As it needs to measure faint cosmological signals at the milliKelvin level, it requires a site that has very low radio frequency interference (RFI) at frequenc…
▽ More
The Baryon acoustic oscillations from Integrated Neutral Gas Observations (BINGO) telescope is a new 40-m class radio telescope to measure the large-angular-scale intensity of Hi emission at 980-1260 MHz to constrain dark energy parameters. As it needs to measure faint cosmological signals at the milliKelvin level, it requires a site that has very low radio frequency interference (RFI) at frequencies around 1 GHz. We report on measurement campaigns across Uruguay and Brazil to find a suitable site, which looked at the strength of the mobile phone signals and other radio transmissions, the location of wind turbines, and also included map** airplane flight paths. The site chosen for the BINGO telescope is a valley at Serra do Urubu, a remote part of Paraiba in North-East Brazil, which has sheltering terrain. During our measurements with a portable receiver we did not detect any RFI in or near the BINGO band, given the sensitivity of the equipment. A radio quiet zone around the selected site has been requested to the Brazilian authorities ahead of the telescope construction.
△ Less
Submitted 23 November, 2018;
originally announced November 2018.
-
Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data
Authors:
Simon Duque Anton,
Lia Ahrens,
Daniel Fraunholz,
Hans Dieter Schotten
Abstract:
The Industrial Internet of Things drastically increases connectivity of devices in industrial applications. In addition to the benefits in efficiency, scalability and ease of use, this creates novel attack surfaces. Historically, industrial networks and protocols do not contain means of security, such as authentication and encryption, that are made necessary by this development. Thus, industrial I…
▽ More
The Industrial Internet of Things drastically increases connectivity of devices in industrial applications. In addition to the benefits in efficiency, scalability and ease of use, this creates novel attack surfaces. Historically, industrial networks and protocols do not contain means of security, such as authentication and encryption, that are made necessary by this development. Thus, industrial IT-security is needed. In this work, emulated industrial network data is transformed into a time series and analysed with three different algorithms. The data contains labeled attacks, so the performance can be evaluated. Matrix Profiles perform well with almost no parameterisation needed. Seasonal Autoregressive Integrated Moving Average performs well in the presence of noise, requiring parameterisation effort. Long Short Term Memory-based neural networks perform mediocre while requiring a high training- and parameterisation effort.
△ Less
Submitted 20 September, 2018;
originally announced September 2018.
-
What is in a radio loud NLS1?
Authors:
Sonia Anton,
Alessandro Caccianiga,
Luca Bizzocchi,
Jose Afonso
Abstract:
A fraction of Narrow Line Seyfert 1 galaxies (NLS1) are hosted by galaxies that present a disturbed morphology, in some cases hinting for merger processes, that are putative sources of gas replenishment. We have been investigating the poorly studied population of radio loud NLS1 (RL-NLS1) showing a flat radio spectrum, assumed to be the manifestation of the presence of a radio jet. In some of the…
▽ More
A fraction of Narrow Line Seyfert 1 galaxies (NLS1) are hosted by galaxies that present a disturbed morphology, in some cases hinting for merger processes, that are putative sources of gas replenishment. We have been investigating the poorly studied population of radio loud NLS1 (RL-NLS1) showing a flat radio spectrum, assumed to be the manifestation of the presence of a radio jet. In some of the objects the infrared emission is well fitted by a combination of an AGN component and an "active" host galaxy component like M82, the estimate SFR being in the LIRG/ULIRG range (10-500 Msun/year). In order to better characterize that component, we have been investigating the sub-millimeter/millimeter emission of the sources using APEX. Here we present the results concerning a pilot sample of 2 representative objects.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
The interacting late-type host galaxy of the radio-loud narrow-line Seyfert 1 IRAS 20181-2244
Authors:
M. Berton,
E. Congiu,
S. Ciroi,
S. Komossa,
M. Frezzato,
F. Di Mille,
S. Antón,
R. Antonucci,
A. Caccianiga,
P. Coppi,
E. Järvelä,
J. Kotilainen,
A. Lähteenmäki,
S. Mathur,
S. Chen,
V. Cracco,
G. La Mura,
P. Rafanelli
Abstract:
Narrow-line Seyfert 1 galaxies (NLS1s) are a class of active galactic nuclei (AGN) which are known to be one of the few sources of $γ$ rays, which originate in a relativistic beamed jet. Becuase of their relatively large distance, a poorly investigated aspect of these jetted NLS1s is their environment, and in particular their host galaxy. In this work we present the results of a morphological anal…
▽ More
Narrow-line Seyfert 1 galaxies (NLS1s) are a class of active galactic nuclei (AGN) which are known to be one of the few sources of $γ$ rays, which originate in a relativistic beamed jet. Becuase of their relatively large distance, a poorly investigated aspect of these jetted NLS1s is their environment, and in particular their host galaxy. In this work we present the results of a morphological analysis of the host galaxy of the jetted NLS1 IRAS 20181-2244 observed with the 6.5m Baade Telescope of the Las Campanas Observatory. The GALFIT analysis ran on the Ks image, along with additional spectroscopic observations performed with the Nordic Optical Telescope, clearly revealed the presence of an interacting system of two galaxies. The data suggest that this NLS1 is hosted by a late-type galaxy, although the result is not conclusive. This analysis, along with other results in the literature, might suggest that two populations of jetted NLS1 exist. Further morphological studies are needed to confirm or disprove this hypothesis.
△ Less
Submitted 3 December, 2018; v1 submitted 24 July, 2018;
originally announced July 2018.
-
Demystifying Deception Technology:A Survey
Authors:
Daniel Fraunholz,
Simon Duque Anton,
Christoph Lipps,
Daniel Reti,
Daniel Krohmer,
Frederic Pohl,
Matthias Tammen,
Hans Dieter Schotten
Abstract:
Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared.
Deception boosts security for systems and components by denial, deceit, misinformation, camouflage and obfuscation. In this work an extensive overview of the deception technology environment is presented. Taxonomies, theoretical backgrounds, psychological aspects as well as concepts, implementations, legal aspects and ethics are discussed and compared.
△ Less
Submitted 17 April, 2018;
originally announced April 2018.
-
Science with e-ASTROGAM (A space mission for MeV-GeV gamma-ray astrophysics)
Authors:
A. De Angelis,
V. Tatischeff,
I. A. Grenier,
J. McEnery,
M. Mallamaci,
M. Tavani,
U. Oberlack,
L. Hanlon,
R. Walter,
A. Argan,
P. Von Ballmoos,
A. Bulgarelli,
A. Bykov,
M. Hernanz,
G. Kanbach,
I. Kuvvetli,
M. Pearce,
A. Zdziarski,
J. Conrad,
G. Ghisellini,
A. Harding,
J. Isern,
M. Leising,
F. Longo,
G. Madejski
, et al. (226 additional authors not shown)
Abstract:
e-ASTROGAM (enhanced ASTROGAM) is a breakthrough Observatory space mission, with a detector composed by a Silicon tracker, a calorimeter, and an anticoincidence system, dedicated to the study of the non-thermal Universe in the photon energy range from 0.3 MeV to 3 GeV - the lower energy limit can be pushed to energies as low as 150 keV for the tracker, and to 30 keV for calorimetric detection. The…
▽ More
e-ASTROGAM (enhanced ASTROGAM) is a breakthrough Observatory space mission, with a detector composed by a Silicon tracker, a calorimeter, and an anticoincidence system, dedicated to the study of the non-thermal Universe in the photon energy range from 0.3 MeV to 3 GeV - the lower energy limit can be pushed to energies as low as 150 keV for the tracker, and to 30 keV for calorimetric detection. The mission is based on an advanced space-proven detector technology, with unprecedented sensitivity, angular and energy resolution, combined with polarimetric capability. Thanks to its performance in the MeV-GeV domain, substantially improving its predecessors, e-ASTROGAM will open a new window on the non-thermal Universe, making pioneering observations of the most powerful Galactic and extragalactic sources, elucidating the nature of their relativistic outflows and their effects on the surroundings. With a line sensitivity in the MeV energy range one to two orders of magnitude better than previous generation instruments, e-ASTROGAM will determine the origin of key isotopes fundamental for the understanding of supernova explosion and the chemical evolution of our Galaxy. The mission will provide unique data of significant interest to a broad astronomical community, complementary to powerful observatories such as LIGO-Virgo-GEO600-KAGRA, SKA, ALMA, E-ELT, TMT, LSST, JWST, Athena, CTA, IceCube, KM3NeT, and LISA.
△ Less
Submitted 8 August, 2018; v1 submitted 3 November, 2017;
originally announced November 2017.
-
Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNO
Authors:
Simon Duque Anton,
Daniel Fraunholz,
Hans Dieter Schotten
Abstract:
The increasing interconnectivity of industrial networks is one of the central current hot topics. It is adressed by research institutes, as well as industry. In order to perform the fourth industrial revolution, a full connectivity between production facilities is necessary. Due to this connectivity, however, an abundance of new attack vectors emerges. In the National Reference Project for Industr…
▽ More
The increasing interconnectivity of industrial networks is one of the central current hot topics. It is adressed by research institutes, as well as industry. In order to perform the fourth industrial revolution, a full connectivity between production facilities is necessary. Due to this connectivity, however, an abundance of new attack vectors emerges. In the National Reference Project for Industrial IT-Security (IUNO), these risks and threats are addressed and solutions are developed. These solutions are especially applicable for small and medium sized enterprises that have not as much means in staff as well as money as larger companies. These enterprises should be able to implement the solutions without much effort. The security solutions are derived from four use cases and implemented prototypically. A further topic of this work are the research areas of the German Research Center for Artificial Intelligence that address the given challenges, as well as the solutions developed in the context of IUNO. Aside from the project itself, a method for distributed network data collection aggregation is presented, as a prerequisite for anomaly detection for network security.
△ Less
Submitted 21 November, 2017; v1 submitted 27 September, 2017;
originally announced September 2017.
-
Gaia Data Release 1. Testing the parallaxes with local Cepheids and RR Lyrae stars
Authors:
Gaia Collaboration,
G. Clementini,
L. Eyer,
V. Ripepi,
M. Marconi,
T. Muraveva,
A. Garofalo,
L. M. Sarro,
M. Palmer,
X. Luri,
R. Molinaro,
L. Rimoldini,
L. Szabados,
I. Musella,
R. I. Anderson,
T. Prusti,
J. H. J. de Bruijne,
A. G. A. Brown,
A. Vallenari,
C. Babusiaux,
C. A. L. Bailer-Jones,
U. Bastian,
M. Biermann,
D. W. Evans,
F. Jansen
, et al. (566 additional authors not shown)
Abstract:
Parallaxes for 331 classical Cepheids, 31 Type II Cepheids and 364 RR Lyrae stars in common between Gaia and the Hipparcos and Tycho-2 catalogues are published in Gaia Data Release 1 (DR1) as part of the Tycho-Gaia Astrometric Solution (TGAS). In order to test these first parallax measurements of the primary standard candles of the cosmological distance ladder, that involve astrometry collected by…
▽ More
Parallaxes for 331 classical Cepheids, 31 Type II Cepheids and 364 RR Lyrae stars in common between Gaia and the Hipparcos and Tycho-2 catalogues are published in Gaia Data Release 1 (DR1) as part of the Tycho-Gaia Astrometric Solution (TGAS). In order to test these first parallax measurements of the primary standard candles of the cosmological distance ladder, that involve astrometry collected by Gaia during the initial 14 months of science operation, we compared them with literature estimates and derived new period-luminosity ($PL$), period-Wesenheit ($PW$) relations for classical and Type II Cepheids and infrared $PL$, $PL$-metallicity ($PLZ$) and optical luminosity-metallicity ($M_V$-[Fe/H]) relations for the RR Lyrae stars, with zero points based on TGAS. The new relations were computed using multi-band ($V,I,J,K_{\mathrm{s}},W_{1}$) photometry and spectroscopic metal abundances available in the literature, and applying three alternative approaches: (i) by linear least squares fitting the absolute magnitudes inferred from direct transformation of the TGAS parallaxes, (ii) by adopting astrometric-based luminosities, and (iii) using a Bayesian fitting approach. TGAS parallaxes bring a significant added value to the previous Hipparcos estimates. The relations presented in this paper represent first Gaia-calibrated relations and form a "work-in-progress" milestone report in the wait for Gaia-only parallaxes of which a first solution will become available with Gaia's Data Release 2 (DR2) in 2018.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Gaia Data Release 1. Open cluster astrometry: performance, limitations, and future prospects
Authors:
Gaia Collaboration,
F. van Leeuwen,
A. Vallenari,
C. Jordi,
L. Lindegren,
U. Bastian,
T. Prusti,
J. H. J. de Bruijne,
A. G. A. Brown,
C. Babusiaux,
C. A. L. Bailer-Jones,
M. Biermann,
D. W. Evans,
L. Eyer,
F. Jansen,
S. A. Klioner,
U. Lammers,
X. Luri,
F. Mignard,
C. Panem,
D. Pourbaix,
S. Randich,
P. Sartoretti,
H. I. Siddiqui,
C. Soubiran
, et al. (567 additional authors not shown)
Abstract:
Context. The first Gaia Data Release contains the Tycho-Gaia Astrometric Solution (TGAS). This is a subset of about 2 million stars for which, besides the position and photometry, the proper motion and parallax are calculated using Hipparcos and Tycho-2 positions in 1991.25 as prior information. Aims. We investigate the scientific potential and limitations of the TGAS component by means of the ast…
▽ More
Context. The first Gaia Data Release contains the Tycho-Gaia Astrometric Solution (TGAS). This is a subset of about 2 million stars for which, besides the position and photometry, the proper motion and parallax are calculated using Hipparcos and Tycho-2 positions in 1991.25 as prior information. Aims. We investigate the scientific potential and limitations of the TGAS component by means of the astrometric data for open clusters. Methods. Mean cluster parallax and proper motion values are derived taking into account the error correlations within the astrometric solutions for individual stars, an estimate of the internal velocity dispersion in the cluster, and, where relevant, the effects of the depth of the cluster along the line of sight. Internal consistency of the TGAS data is assessed. Results. Values given for standard uncertainties are still inaccurate and may lead to unrealistic unit-weight standard deviations of least squares solutions for cluster parameters. Reconstructed mean cluster parallax and proper motion values are generally in very good agreement with earlier Hipparcos-based determination, although the Gaia mean parallax for the Pleiades is a significant exception. We have no current explanation for that discrepancy. Most clusters are observed to extend to nearly 15 pc from the cluster centre, and it will be up to future Gaia releases to establish whether those potential cluster-member stars are still dynamically bound to the clusters. Conclusions. The Gaia DR1 provides the means to examine open clusters far beyond their more easily visible cores, and can provide membership assessments based on proper motions and parallaxes. A combined HR diagram shows the same features as observed before using the Hipparcos data, with clearly increased luminosities for older A and F dwarfs.
△ Less
Submitted 3 March, 2017;
originally announced March 2017.
-
SDSSJ143244.91+301435.3 at VLBI: a compact radio galaxy in a narrow-line Seyfert 1
Authors:
A. Caccianiga,
D. Dallacasa,
S. Anton,
L. Ballo,
M. Berton,
K. -H. Mack,
A. Paulino-Afonso
Abstract:
We present VLBI observations, carried out with the European Very Long Baseline Interferometry Network (EVN), of SDSSJ143244.91+301435.3, a radio-loud narrow-line Seyfert 1 (RLNLS1) characterized by a steep radio spectrum. The source, compact at Very Large Array (VLA) resolution, is resolved on the milliarcsec scale, showing a central region plus two extended structures. The relatively high brightn…
▽ More
We present VLBI observations, carried out with the European Very Long Baseline Interferometry Network (EVN), of SDSSJ143244.91+301435.3, a radio-loud narrow-line Seyfert 1 (RLNLS1) characterized by a steep radio spectrum. The source, compact at Very Large Array (VLA) resolution, is resolved on the milliarcsec scale, showing a central region plus two extended structures. The relatively high brightness temperature of all components (5x10^6-1.3x10^8 K) supports the hypothesis that the radio emission is non-thermal and likely produced by a relativistic jet and/or small radio lobes. The observed radio morphology, the lack of a significant core and the presence of a low frequency (230 MHz) spectral turnover are reminiscent of the Compact Steep Spectrum sources (CSS). However, the linear size of the source (~0.5kpc) measured from the EVN map is lower than the value predicted using the turnover/size relation valid for CSS sources (~6kpc). This discrepancy can be explained by an additional component not detected in our observations, accounting for about a quarter of the total source flux density, combined to projection effects. The low core-dominance of the source (CD<0.29) confirms that SDSSJ143244.91+301435.3 is not a blazar, i.e. the relativistic jet is not pointing towards the observer. This supports the idea that SDSSJ143244.91+301435.3 may belong to the "parent population" of flat-spectrum RLNLS1 and favours the hypothesis of a direct link between RLNLS1 and compact, possibly young, radio galaxies.
△ Less
Submitted 29 September, 2016;
originally announced September 2016.
-
Gaia Data Release 1: Astrometry - one billion positions, two million proper motions and parallaxes
Authors:
L. Lindegren,
U. Lammers,
U. Bastian,
J. Hernández,
S. Klioner,
D. Hobbs,
A. Bombrun,
D. Michalik,
M. Ramos-Lerate,
A. Butkevich,
G. Comoretto,
E. Joliet,
B. Holl,
A. Hutton,
P. Parsons,
H. Steidelmüller,
U. Abbas,
M. Altmann,
A. Andrei,
S. Anton,
N. Bach,
C. Barache,
U. Becciani,
J. Berthier,
L. Bianchi
, et al. (58 additional authors not shown)
Abstract:
Gaia Data Release 1 (Gaia DR1) contains astrometric results for more than 1 billion stars brighter than magnitude 20.7 based on observations collected by the Gaia satellite during the first 14 months of its operational phase. We give a brief overview of the astrometric content of the data release and of the model assumptions, data processing, and validation of the results. For stars in common with…
▽ More
Gaia Data Release 1 (Gaia DR1) contains astrometric results for more than 1 billion stars brighter than magnitude 20.7 based on observations collected by the Gaia satellite during the first 14 months of its operational phase. We give a brief overview of the astrometric content of the data release and of the model assumptions, data processing, and validation of the results. For stars in common with the Hipparcos and Tycho-2 catalogues, complete astrometric single-star solutions are obtained by incorporating positional information from the earlier catalogues. For other stars only their positions are obtained by neglecting their proper motions and parallaxes. The results are validated by an analysis of the residuals, through special validation runs, and by comparison with external data. Results. For about two million of the brighter stars (down to magnitude ~11.5) we obtain positions, parallaxes, and proper motions to Hipparcos-type precision or better. For these stars, systematic errors depending e.g. on position and colour are at a level of 0.3 milliarcsecond (mas). For the remaining stars we obtain positions at epoch J2015.0 accurate to ~10 mas. Positions and proper motions are given in a reference frame that is aligned with the International Celestial Reference Frame (ICRF) to better than 0.1 mas at epoch J2015.0, and non-rotating with respect to ICRF to within 0.03 mas/yr. The Hipparcos reference frame is found to rotate with respect to the Gaia DR1 frame at a rate of 0.24 mas/yr. Based on less than a quarter of the nominal mission length and on very provisional and incomplete calibrations, the quality and completeness of the astrometric data in Gaia DR1 are far from what is expected for the final mission products. The results nevertheless represent a huge improvement in the available fundamental stellar data and practical definition of the optical reference frame.
△ Less
Submitted 14 September, 2016;
originally announced September 2016.