Sciweavers

290 search results - page 20 / 58
» Attack detection in time series for recommender systems
Sort
View
USS
2008
13 years 11 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 6 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
IPPS
2002
IEEE
14 years 1 months ago
A Prediction-Based Real-Time Scheduling Advisor
The real-time scheduling advisor (RTSA) is an entirely userlevel system that an application running on a typical shared, unreserved distributed computing environment can turn to f...
Peter A. Dinda
INFOCOM
2009
IEEE
14 years 3 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
ACSAC
2006
IEEE
14 years 2 months ago
Backtracking Algorithmic Complexity Attacks against a NIDS
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near...
Randy Smith, Cristian Estan, Somesh Jha