Results 231 to 240 of about 574,096 (277)
Some of the next articles are maybe not open access.

Statistical attack detection

Proceedings of the third ACM conference on Recommender systems, 2009
It has been shown in recent years that effective profile injection or shilling attacks can be mounted on standard recommendation algorithms. These attacks consist of the insertion of bogus user profiles into the system database in order to manipulate the recommendation output, for example to promote or demote the predicted ratings for a particular ...
Neil Hurley   +2 more
openaire   +1 more source

Detection by Attack: Detecting Adversarial Samples by Undercover Attack

2020
The safety of artificial intelligence systems has aroused great concern due to the vulnerability of deep neural networks. Studies show that malicious modifications to the inputs of a network classifier, can fool the classifier and lead to wrong predictions. These modified inputs are called adversarial samples.
Qifei Zhou   +4 more
openaire   +1 more source

Attack chain detection

Statistical Analysis and Data Mining: The ASA Data Science Journal, 2015
AbstractA targeted network intrusion typically evolves through multiple phases, termed the attack chain. When appropriate data are monitored, these phases will generate multiple events across the attack chain on a compromised host. It is shown empirically that events in different parts of the attack chain are largely independent under nonattack ...
Joseph Sexton   +2 more
openaire   +1 more source

Detection of attack strategies

2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
An intrusion and attack detection system usually focuses on classifying a record as either normal or abnormal. In some cases such as insider attacks, attackers rely on feedback from the attacked system, which enables them to gradually manipulate their attempts in order to avoid detection. This paper proposes the notion of accumulative manipulation that
Suliman A. Alsuhibany   +2 more
openaire   +1 more source

DDoS attack detection and wavelets

Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712), 2004
This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered a system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification.
Lan Li, Gyungho Lee
openaire   +1 more source

Detecting attacks on networks

Computer, 1997
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire   +1 more source

Lightweight Detection of DoS Attacks

2007 15th IEEE International Conference on Networks, 2007
Denial of service (DoS) attacks have continued to evolve and impact availability of the Internet infrastructure. Many researchers in the field of network security and system survivability have been developing mechanisms to detect DoS attacks. By doing so they hope to maximize accurate detections (true-positive) and minimize non-justified detections ...
Sirikarn Pukkawanna   +2 more
openaire   +1 more source

On the Sybil attack detection in VANET

2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007
Since few years, Vehicular Ad hoc Networks deserve much attention. The development of wireless communication in VANET implies to take into account the need of security. In VANET, many attacks rely on having the attacker generate multiple identities to simulate multiple nodes: this is called the Sybil attack.
Gilles Guette, Bertrand Ducourthial
openaire   +1 more source

A Calculus to Detect Guessing Attacks

2009
We present a calculus for detecting guessing attacks, based on oracles that instantiate cryptographic functions. Adversaries can observe oracles, or control them either on-line or off-line. These relations can be established by protocol analysis in the presence of a Dolev-Yao intruder, and the derived guessing rules can be used together with standard ...
Bogdan Groza, Marius Minea
openaire   +1 more source

Understanding and Detecting Majority Attacks

2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 2020
Blockchain technologies are becoming increasingly popular for financial and business solutions thanks to their many features and adaptability. However, their security is not assured. Of particular concern are majority attacks, which exploit the consensus algorithm used to resolve competing chains to modify past and present transactions on the ...
Thomas Cilloni   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy