Sciweavers

708 search results - page 31 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
CHES
2008
Springer
135views Cryptology» more  CHES 2008»
13 years 9 months ago
Multiple-Differential Side-Channel Collision Attacks on AES
In this paper, two efficient multiple-differential methods to detect collisions in the presence of strong noise are proposed - binary and ternary voting. After collisions have been...
Andrey Bogdanov
GLOBECOM
2006
IEEE
14 years 1 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
CN
2008
84views more  CN 2008»
13 years 7 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
ICDCS
2007
IEEE
14 years 1 months ago
Streaming Algorithms for Robust, Real-Time Detection of DDoS Attacks
Effective mechanisms for detecting and thwarting Distributed Denial-of-Service (DDoS) attacks are becoming increasingly important to the success of today’s Internet as a viable ...
Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastog...
INFOCOM
2007
IEEE
14 years 1 months ago
Attack Detection in Wireless Localization
— Accurately positioning nodes in wireless and sensor networks is important because the location of sensors is a critical input to many higher-level networking tasks. However, th...
Yingying Chen, Wade Trappe, Richard P. Martin