Results 81 to 90 of about 6,155,073 (227)
DOS Attacks or Denial Of Services Attack have become very common amongst Hackers who use them as a path to get fame and respect in the underground groups of the Internet. Denial of Service Attacks basically means denying valid Internet and Network users from using the services of the target network or server.
null Prof. B. V. Jadhav +4 more
openaire +1 more source
Data Attacks on Power Grids: Leveraging Detection
Data attacks on meter measurements in the power grid can lead to errors in state estimation. This paper presents a new data attack model where an adversary produces changes in state estimation despite failing bad-data detection checks.
Baldick, Ross +2 more
core +1 more source
Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack ...
B. Qi +14 more
core +1 more source
An intrusion detection system is a software or hardware tool designed to detect unauthorized access to or control of a computer system or network, mainly via the Internet. Today, there are several types of IDS that differ in their monitoring and analysis methods. Each approach has its own advantages and disadvantages. In addition, all approaches can be
openaire +1 more source
Attack simulation and signature extraction of low-rate DDoS
LDDoS (low-rate distributed denial-of-service) was a new type of DDoS attack. It had small traffic and cov- ered by normal network traffic. LDDoS attack was so stealthy that the detection and defense approaches of traditional DDoS could not be effective.
WU Zhi-jun, ZHANG Dong
doaj +2 more sources
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard.
JungChan Na +5 more
doaj +1 more source
Sleep Deprivation Attack Detection in Wireless Sensor Network
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes.
Bhattasali, Tapalina +2 more
core +3 more sources
Multi-Stage Adversarial Defense for Online DDoS Attack Detection System in IoT
Machine learning-based Distributed Denial of Service (DDoS) attack detection systems have proven effective in detecting and preventing DDoD attacks in Internet of Things (IoT) systems.
Yonas Kibret Beshah +2 more
doaj +1 more source
Feature Engineering for Detection of Wormhole Attacking in Mobile Ad Hoc Networks with Machine Learning Methods [PDF]
Due to the self-configuring nature of a Mobile Ad Hoc Network (MANET), each node must participate in the routing process, in addition to its other activities.
Dooley, Laurence S. +3 more
core
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs).
Ding, Guoru +5 more
core +1 more source

