Sciweavers

5234 search results - page 74 / 1047
» Simulation of Computer Network Attacks
Sort
View
DSN
2009
IEEE
14 years 3 months ago
On the effectiveness of low latency anonymous network in the presence of timing attack
In this paper, we introduce a novel metric that can quantitatively measure the practical effectiveness (i.e. anonymity) of all anonymous networks in the presence of timing attack....
Jing Jin, Xinyuan Wang
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
14 years 2 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
SIGCOMM
2006
ACM
14 years 3 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 28 days ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou
INFOCOM
2008
IEEE
14 years 3 months ago
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy