Sciweavers

832 search results - page 49 / 167
» Effect of Malicious Synchronization
Sort
View
TISSEC
2008
100views more  TISSEC 2008»
13 years 9 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
SICHERHEIT
2010
13 years 7 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
IPL
2007
72views more  IPL 2007»
13 years 9 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay
SAINT
2007
IEEE
14 years 4 months ago
A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior
In this paper, we propose three metrics for detecting botnets through analyzing their behavior. Our social infrastructure (i.e., the Internet) is currently experiencing the danger...
Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shi...
CSFW
2004
IEEE
14 years 1 months ago
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
Frédéric Cuppens, Sylvain Gombault, ...