Sciweavers

5234 search results - page 90 / 1047
» Simulation of Computer Network Attacks
Sort
View
AINA
2007
IEEE
14 years 3 months ago
On the Contribution of Preamble to Information Hiding in Mimicry Attacks
In this paper, we aim to determine the significance of different stages of an attack, namely the preamble and the exploit, on an achieved anomaly rate. To this end, we analyze fou...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
IPTPS
2005
Springer
14 years 2 months ago
A Taxonomy of Rational Attacks
Abstract— For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neith...
Seth James Nielson, Scott A. Crosby, Dan S. Wallac...
WS
2004
ACM
14 years 2 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
NDSS
2006
IEEE
14 years 3 months ago
Induced Churn as Shelter from Routing-Table Poisoning
Structured overlays are an important and powerful class of overlay networks that has emerged in recent years. They are typically targeted at peer-to-peer deployments involving mil...
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph ...
ACSC
2005
IEEE
14 years 2 months ago
Dependable Dynamic Source Routing without a Trusted Third Party
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of t...
Asad Amir Pirzada, Chris McDonald, Amitava Datta