Results 11 to 20 of about 291,448 (281)

Network attack detection at flow level [PDF]

open access: yes, 2011
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.
C. Douligeris   +3 more
core   +2 more sources

Network Inspection for Detecting Strategic Attacks [PDF]

open access: yesOperations Research, 2022
Ensuring the security of critical infrastructures is crucial for the society’s welfare and prosperity. However, these infrastructure networks are inherently vulnerable to both intentional and unintentional threats. In “Network Inspection for Detecting Strategic Attacks,” Dahan, Sela, and Amin study a strategic network inspection problem, formulated as
Mathieu Dahan, Lina Sela, Saurabh Amin
openaire   +2 more sources

On Scalable Attack Detection in the Network [PDF]

open access: yesIEEE/ACM Transactions on Networking, 2004
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans)at network vantage points. Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.
Ramana Rao Kompella   +2 more
openaire   +2 more sources

IoT Network Attack Detection and Mitigation [PDF]

open access: yes2020 9th Mediterranean Conference on Embedded Computing (MECO), 2020
Cyberattacks on the Internet of Things (IoT) can cause major economic and physical damage, and disrupt production lines, manufacturing processes, supply chains, impact the physical safety of vehicles, and damage the health of human beings. Thus we describe and evaluate a distributed and robust attack detection and mitigation system for network ...
Erol Gelenbe   +6 more
openaire   +2 more sources

On the difficulty of scalably detecting network attacks [PDF]

open access: yesProceedings of the 11th ACM conference on Computer and communications security, 2004
Most network intrusion tools (e.g., Bro) use per-flow state to reassemble TCP connections and fragments in order to detect network attacks (e.g., SYN Flooding or Connection Hijacking) and preliminary reconnaissance (e.g., Port Scans). On the other hand, if network intrusion detection is to be implemented at high speeds at network vantage points, some ...
Kirill Levchenko   +2 more
openaire   +1 more source

A machine-learning procedure to detect network attacks

open access: yesJournal of Complex Networks, 2023
Abstract The goal of this note is to assess whether simple machine-learning algorithms can be used to determine whether and how a given network has been attacked. The procedure is based on the k-Nearest Neighbour and the Random Forest classification schemes, using both intact and attacked Erdős–Rényi, Barabasi–Albert and Watts–Strogatz ...
Davide Coppes, Paolo Cermelli
openaire   +2 more sources

Detection of biasing attacks on distributed estimation networks [PDF]

open access: yes2016 IEEE 55th Conference on Decision and Control (CDC), 2016
The paper is to appear in Proceedings of the 55th IEEE Conference on Decision and Control, Las Vegas, December ...
Deghat, M   +3 more
openaire   +3 more sources

Wireless Network Intrusion Detection Algorithm Based on Multiple Perspectives Hierarchical Clustering [PDF]

open access: yesJisuanji kexue yu tansuo, 2022
Aiming at the problems of high false detection rate, difficult to find unknown attack behavior and high cost of obtaining marked data in existing wireless network intrusion detection algorithms based on supervised learning, this paper proposes an ...
DONG Xinyu, XIE Bin, ZHAO Xusheng, GAO Xinbao
doaj   +1 more source

Flooding attacks detection in traffic of backbone networks [PDF]

open access: yes2011 IEEE 36th Conference on Local Computer Networks, 2011
Internet services are vulnerable to flooding attacks that lead to denial of service. This paper proposes a new framework to detect anomalies and to provide early alerts for flooding attacks in backbone networks. Thus allow to quickly react in order to prevent the flooding attacks from strangling the victim server and its access network.
Osman Salem   +3 more
openaire   +2 more sources

Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification [PDF]

open access: yes2006 Securecomm and Workshops, 2006
Overlay multicast networks are used by service providers to distribute contents such as Web pages, static and streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to message-dropping attacks by malicious or selfish nodes that intentionally drop the packets they are required to ...
Liang Xie 0002, Sencun Zhu
openaire   +1 more source

Home - About - Disclaimer - Privacy