Sciweavers

337 search results - page 27 / 68
» Statistical Disclosure Attacks
Sort
View
COMCOM
2006
121views more  COMCOM 2006»
13 years 8 months ago
Application of anomaly detection algorithms for detecting SYN flooding attacks
Abstract-- We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is the most common type of Denial of Service (DoS) attack. The two algorithms c...
Vasilios A. Siris, Fotini Papagalou
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 6 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
SASN
2006
ACM
14 years 2 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
ICC
2007
IEEE
106views Communications» more  ICC 2007»
14 years 2 months ago
A Robust Statistical Scheme to Monitor Transient Phenomenon in Sensor Networks
— Wireless sensor networks have been deployed for various critical monitoring applications in hostile environments such as monitoring the concentration levels of hazardous gas sp...
Vinod Shukla, Daji Qiao
TCSV
2008
134views more  TCSV 2008»
13 years 8 months ago
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain
Watermark resistance to geometric attacks is an important issue in the image watermarking community. Most countermeasures proposed in the literature usually focus on the problem of...
Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang