Sciweavers

201 search results - page 11 / 41
» A Network Game with Attackers and a Defender
Sort
View
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 1 months ago
A New Replay Attack Against Anonymous Communication Networks
Abstract— Tor is a real-world, circuit-based low-latency anonymous communication network, supporting TCP applications on the Internet. In this paper, we present a new class of at...
Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao
APNOMS
2006
Springer
13 years 11 months ago
IP Traceback Algorithm for DoS/DDoS Attack
Abstract. DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do n...
Hong-bin Yim, Jae-il Jung
ICC
2007
IEEE
133views Communications» more  ICC 2007»
14 years 1 months ago
Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks
— Distributed Denial of Service attacks pose a serious threat to many businesses which rely on constant availability of their network services. Companies like Google, Yahoo and A...
Stefan Seufert, Darragh O'Brien
FMCO
2003
Springer
154views Formal Methods» more  FMCO 2003»
14 years 21 days ago
Tools for Generating and Analyzing Attack Graphs
Abstract. Attack graphs depict ways in which an adversary exploits system vulnerabilities to achieve a desired state. System administrators use attack graphs to determine how vulne...
Oleg Sheyner, Jeannette M. Wing
NCA
2009
IEEE
14 years 2 months ago
Attribute-Based Prevention of Phishing Attacks
Abstract—This paper describes a set of innovative attributebased checks for defending against phishing attacks1 . We explain a number of anti-phishing algorithms implemented as p...
Michael Atighetchi, Partha Pratim Pal