Sciweavers

708 search results - page 5 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 7 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
TISSEC
2008
100views more  TISSEC 2008»
13 years 7 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
ICDIM
2008
IEEE
14 years 1 months ago
NIDS based on payload word frequencies and anomaly of transitions
This paper presents a novel payload analysis method. Consecutive bytes are separated by boundary symbols and defined as words. The frequencies of word appearance and word to word ...
Sasa Mrdovic, Branislava Perunicic
DCOSS
2010
Springer
13 years 10 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
SERSCISA
2009
Springer
14 years 2 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim