Sciweavers

382 search results - page 7 / 77
» Tracing Network Attacks to Their Sources
Sort
View
ATAL
2004
Springer
14 years 27 days ago
A Fluid Dynamics Approach to Multi-Robot Chemical Plume Tracing
This paper presents a novel chemical plume tracing algorithm executed by a distributed network of mobile sensing agents that measure the ambient fluid velocity and chemical conce...
Dimitri Zarzhitsky, Diana F. Spears, William M. Sp...
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 5 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
14 years 2 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
ICPADS
2006
IEEE
14 years 1 months ago
Coloring the Internet: IP Traceback
Several IP Traceback schemes employing packet marking have been proposed to trace DoS/DDoS attacks that use source address spoofing. The major challenges in the design of an ef...
Muthusrinivasan Muthuprasanna, G. Manimaran, Manso...
ACSAC
2003
IEEE
14 years 24 days ago
An IP Traceback Technique against Denial-of-Service Attacks
Reflector attack [9] belongs to one of the most serious types of Denial-of-Service (DoS) attacks, which can hardly be traced by contemporary traceback techniques, since the marked...
Zhaole Chen, Moon-Chuen Lee