Sciweavers

82 search results - page 13 / 17
» Detecting and Preventing IP-spoofed Distributed DoS Attacks
Sort
View
HPCA
2011
IEEE
13 years 8 days ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
MUE
2009
IEEE
252views Multimedia» more  MUE 2009»
14 years 3 months ago
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats...
Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan
DBSEC
2003
140views Database» more  DBSEC 2003»
13 years 10 months ago
Correlated Data Inference
In this paper we examine undesired inference attacks from distributed public XML documents. An undesired inference is a chain of reasoning that leads to protected data of an organ...
Csilla Farkas, Andrei Stoica
ICDCS
2003
IEEE
14 years 1 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...
USS
2010
13 years 6 months ago
Baaz: A System for Detecting Access Control Misconfigurations
Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many fact...
Tathagata Das, Ranjita Bhagwan, Prasad Naldurg