Sciweavers

5234 search results - page 12 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICNC
2005
Springer
14 years 1 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 9 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
PERCOM
2006
ACM
14 years 7 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
ICNP
2007
IEEE
14 years 2 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
ICDCSW
2005
IEEE
14 years 1 months ago
MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks
— In this paper, we propose a new approach called MAFIC (MAlicious Flow Identification and Cutoff) to support adaptive packet dropping to fend off DDoS attacks. MAFIC works by j...
Yu Chen, Yu-Kwong Kwok, Kai Hwang