Sciweavers

142 search results - page 8 / 29
» Statistical Approaches to DDoS Attack Detection and Response
Sort
View
ICCCN
2007
IEEE
14 years 2 months ago
Attack Containment Framework for Large-Scale Critical Infrastructures
— We present an attack containment framework against value-changing attacks in large-scale critical infrastructures, based on early warning and cooperative response approaches. W...
Hoang Nguyen, Klara Nahrstedt
ACSAC
2002
IEEE
14 years 27 days ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
12 years 3 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
DSN
2006
IEEE
13 years 11 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
ISVC
2007
Springer
14 years 2 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano