Sciweavers

141 search results - page 17 / 29
» Real-time Analysis of Flow Data for Network Attack Detection
Sort
View
ICDCSW
2008
IEEE
14 years 2 months ago
Modeling Attack Behaviors in Rating Systems
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei D...
ICDCSW
2006
IEEE
14 years 1 months ago
An Evaluation of the Effectiveness of Measurement-based Anomaly Detection Techniques
A number of recent studies have proposed measurement based approaches to network traffic analysis. These techniques treat traffic volume and traffic header data as signals or imag...
Seong Soo Kim, A. L. Narasimha Reddy
ADHOC
2008
132views more  ADHOC 2008»
13 years 8 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop