Results 241 to 250 of about 574,096 (277)
Some of the next articles are maybe not open access.
Scalable Detection of Cyber Attacks
2011Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
Massimiliano Albanese +3 more
openaire +2 more sources
DDoS Attacks Detection with AutoEncoder
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, 2020Although many distributed denial of service (DDoS) attacks detection algorithms have been proposed and even some of them have claimed high detection accuracy, DDoS attacks are still a major problem for network security. The latent and inherent problems of these detection algorithms are 1) Requirement of both normal and attack data for building ...
Kun Yang +3 more
openaire +1 more source
On the detection of pod slurping attacks
Computers & Security, 2010Time is recognised to be a dimension of paramount importance in computer forensics. In this paper, we report on the potential of identifying past pod slurping type of attacks by constructing a synthetic metric based on information contained in filesystem timestamps. More specifically, by inferring the transfer rate of a file from last access timestamps
Theodoros Kavallaris, Vasilios Katos
openaire +1 more source
Detecting SYN flooding attacks
Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2003We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a victim server itself, we detect the SYN flooding attacks at leaf routers that connect end hosts to the Internet. The simplicity of our detection mechanism lies in its statelessness and low
Haining Wang 0001 +2 more
openaire +1 more source
Targeted attacks detection with SPuNge
2013 Eleventh Annual Conference on Privacy, Security and Trust, 2013Over the past several years there has been a noticeable rise in the number of reported targeted attacks, which are also commonly referred to as advanced persistent threats (APTs). This is seen by security experts as a landscape shift from a world dominated by widespread malware that infect indiscriminately, to a more selectively targeted approach with ...
Marco Balduzzi +2 more
openaire +1 more source
Network Attack Detection and Mitigation
2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to
Sangita Roy, Ashok Singh Sairam
openaire +1 more source
On the Detection of Side-Channel Attacks
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the confidentiality of a system raise serious security concerns. This applies especially to systems offering shared hardware or resources to their customers.
Tsvetoslava Vateva-Gurova, Neeraj Suri
openaire +1 more source
On Detecting Code Reuse Attacks
Automatic Control and Computer Sciences, 2020Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against execution of code in the stack, which is implemented on the hardware and software levels in modern information systems. The attacks are based on finding suitable sections of executable code–gadgets–
openaire +1 more source
Flooding attacks detection in MANETs
2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015Flooding attacks are well-known security threats that can lead to a denial of service (DoS) in computer networks. These attacks consist of an excessive traffic generation, by which an attacker aim to disrupt or interrupt some services in the network. The impact of flooding attacks is not just about some nodes, it can be also the whole network.
Rmayti, Mohammad +4 more
openaire +3 more sources
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing, 2013Sybil attacks have been regarded as a serious security threat to Ad hoc Networks and Sensor Networks. They may also impair the potential applications in Vehicular Ad hoc Networks (VANETs) by creating an illusion of traffic congestion. In this paper, we make various attempts to explore the feasibility of detecting Sybil attacks by analyzing signal ...
Bo Yu 0019 +2 more
openaire +1 more source

