Sciweavers

429 search results - page 25 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
IEEEARES
2008
IEEE
14 years 2 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
GLOBECOM
2010
IEEE
13 years 6 months ago
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy....
Titus Abraham, Matthew Wright
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
13 years 10 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
CN
2008
84views more  CN 2008»
13 years 8 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
SASN
2006
ACM
14 years 2 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...