Sciweavers

268 search results - page 24 / 54
» A Statistical Attack on RC6
Sort
View
ENTCS
2006
175views more  ENTCS 2006»
13 years 7 months ago
Observing Internet Worm and Virus Attacks with a Small Network Telescope
A network telescope is a portion of the IP address space which is devoted to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious ...
Uli Harder, Matt W. Johnson, Jeremy T. Bradley, Wi...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 1 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
DSN
2005
IEEE
14 years 1 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu