Results 241 to 250 of about 574,096 (277)
Some of the next articles are maybe not open access.

Scalable Detection of Cyber Attacks

2011
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
Massimiliano Albanese   +3 more
openaire   +2 more sources

DDoS Attacks Detection with AutoEncoder

NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020
Although many distributed denial of service (DDoS) attacks detection algorithms have been proposed and even some of them have claimed high detection accuracy, DDoS attacks are still a major problem for network security. The latent and inherent problems of these detection algorithms are 1) Requirement of both normal and attack data for building ...
Kun Yang   +3 more
openaire   +1 more source

On the detection of pod slurping attacks

Computers & Security, 2010
Time is recognised to be a dimension of paramount importance in computer forensics. In this paper, we report on the potential of identifying past pod slurping type of attacks by constructing a synthetic metric based on information contained in filesystem timestamps. More specifically, by inferring the transfer rate of a file from last access timestamps
Theodoros Kavallaris, Vasilios Katos
openaire   +1 more source

Detecting SYN flooding attacks

Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2003
We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our detection mechanism lies in its statelessness and low
Haining Wang 0001   +2 more
openaire   +1 more source

Targeted attacks detection with SPuNge

2013 Eleventh Annual Conference on Privacy, Security and Trust, 2013
Over the past several years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). This is seen by security experts as a landscape shift from a world dominated by widespread malware that infect indiscriminately, to a more selectively targeted approach with ...
Marco Balduzzi   +2 more
openaire   +1 more source

Network Attack Detection and Mitigation

2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015
Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to
Sangita Roy, Ashok Singh Sairam
openaire   +1 more source

On the Detection of Side-Channel Attacks

2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the confidentiality of a system raise serious security concerns. This applies especially to systems offering shared hardware or resources to their customers.
Tsvetoslava Vateva-Gurova, Neeraj Suri
openaire   +1 more source

On Detecting Code Reuse Attacks

Automatic Control and Computer Sciences, 2020
Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against execution of code in the stack, which is implemented on the hardware and software levels in modern information systems. The attacks are based on finding suitable sections of executable code–gadgets–
openaire   +1 more source

Flooding attacks detection in MANETs

2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015
Flooding attacks are well-known security threats that can lead to a denial of service (DoS) in computer networks. These attacks consist of an excessive traffic generation, by which an attacker aim to disrupt or interrupt some services in the network. The impact of flooding attacks is not just about some nodes, it can be also the whole network.
Rmayti, Mohammad   +4 more
openaire   +3 more sources

Detecting Sybil attacks in VANETs

Journal of Parallel and Distributed Computing, 2013
Sybil attacks have been regarded as a serious security threat to Ad hoc Networks and Sensor Networks. They may also impair the potential applications in Vehicular Ad hoc Networks (VANETs) by creating an illusion of traffic congestion. In this paper, we make various attempts to explore the feasibility of detecting Sybil attacks by analyzing signal ...
Bo Yu 0019   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy