Sciweavers

614 search results - page 43 / 123
» Intrusion Detection for Routing Attacks in Sensor Networks
Sort
View
EWSN
2010
Springer
14 years 4 months ago
TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
Multi-hop routing in wireless sensor networks (WSNs) offers little protection against deception through replaying routing information. This defect can be taken advantage of by an a...
Guoxing Zhan, Weisong Shi, Julia Deng
HAIS
2008
Springer
13 years 8 months ago
Classification Agent-Based Techniques for Detecting Intrusions in Databases
This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reaso...
Cristian Pinzón, Yanira de Paz, Rosa Cano
ICNP
2009
IEEE
13 years 5 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
RAID
2005
Springer
14 years 1 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
AINA
2008
IEEE
14 years 2 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar