Results 271 to 280 of about 178,776 (288)
Some of the next articles are maybe not open access.

DDoS attack detection and wavelets

Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712), 2004
This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered a system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification.
Lan Li, Gyungho Lee
openaire   +1 more source

Attack Detection Model

2014
User spoofing has a serious impact to the normal operation of wireless and sensor networks. It is thus desirable to detect the presence of identity-based attacks and eliminate them from the network. The traditional approach to address identity-based attacks is to apply cryptographic authentication.
Jie Yang   +3 more
openaire   +1 more source

Detection of phishing attacks

2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the ...
Muhammet Baykara, Zahit Ziya Gurel
openaire   +1 more source

DDoS Attack Detection

2013
In this chapter, we study on detection methods on DDoS attacks, which covers feature based detection methods, network traffic based detection methods, and detections against legitimate network event mimicking attacks. Each detection method is mathematically modelled for readers for possible further work in the fields.
openaire   +1 more source

Scalable Detection of Cyber Attacks

2011
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise critical systems. The enormous amount of raw security data available to analysts and the complex interdependencies among vulnerabilities make manual analysis extremely labor-intensive and error-prone. To address this important problem, we build on previous work on
ALBANESE M   +3 more
openaire   +2 more sources

SIP Stealthy Attack Detection and Resource-Drained Malformed Message Attack Detection

2013
In this chapter, we first address the stealthy attack, where intelligent attackers can afford a long time to attack the system, and only incur minor changes to the system within each sampling period. To identify such attacks in the early stage for timely responses, we propose a detection scheme based on the signal processing technique wavelet, which is
Jin Tang, Yu Cheng
openaire   +1 more source

Detecting attacks on networks

Computer, 1997
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire   +1 more source

Attack Detection

2020
Richard R. Brooks, İlker Özçelik
openaire   +1 more source

Detection of Cyber-Attacks

2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire   +1 more source

Home - About - Disclaimer - Privacy