Results 11 to 20 of about 291,448 (281)
Network attack detection at flow level [PDF]
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.
C. Douligeris +3 more
core +2 more sources
Network Inspection for Detecting Strategic Attacks [PDF]
Ensuring the security of critical infrastructures is crucial for the society’s welfare and prosperity. However, these infrastructure networks are inherently vulnerable to both intentional and unintentional threats. In “Network Inspection for Detecting Strategic Attacks,” Dahan, Sela, and Amin study a strategic network inspection problem, formulated as
Mathieu Dahan, Lina Sela, Saurabh Amin
openaire +2 more sources
On Scalable Attack Detection in the Network [PDF]
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans)at network vantage points. Unfortunately, all the IDS systems we know of keep per-connection or per-flow state.
Ramana Rao Kompella +2 more
openaire +2 more sources
IoT Network Attack Detection and Mitigation [PDF]
Cyberattacks on the Internet of Things (IoT) can cause major economic and physical damage, and disrupt production lines, manufacturing processes, supply chains, impact the physical safety of vehicles, and damage the health of human beings. Thus we describe and evaluate a distributed and robust attack detection and mitigation system for network ...
Erol Gelenbe +6 more
openaire +2 more sources
On the difficulty of scalably detecting network attacks [PDF]
Most network intrusion tools (e.g., Bro) use per-flow state to reassemble TCP connections and fragments in order to detect network attacks (e.g., SYN Flooding or Connection Hijacking) and preliminary reconnaissance (e.g., Port Scans). On the other hand, if network intrusion detection is to be implemented at high speeds at network vantage points, some ...
Kirill Levchenko +2 more
openaire +1 more source
A machine-learning procedure to detect network attacks
Abstract The goal of this note is to assess whether simple machine-learning algorithms can be used to determine whether and how a given network has been attacked. The procedure is based on the k-Nearest Neighbour and the Random Forest classification schemes, using both intact and attacked Erdős–Rényi, Barabasi–Albert and Watts–Strogatz ...
Davide Coppes, Paolo Cermelli
openaire +2 more sources
Detection of biasing attacks on distributed estimation networks [PDF]
The paper is to appear in Proceedings of the 55th IEEE Conference on Decision and Control, Las Vegas, December ...
Deghat, M +3 more
openaire +3 more sources
Wireless Network Intrusion Detection Algorithm Based on Multiple Perspectives Hierarchical Clustering [PDF]
Aiming at the problems of high false detection rate, difficult to find unknown attack behavior and high cost of obtaining marked data in existing wireless network intrusion detection algorithms based on supervised learning, this paper proposes an ...
DONG Xinyu, XIE Bin, ZHAO Xusheng, GAO Xinbao
doaj +1 more source
Flooding attacks detection in traffic of backbone networks [PDF]
Internet services are vulnerable to flooding attacks that lead to denial of service. This paper proposes a new framework to detect anomalies and to provide early alerts for flooding attacks in backbone networks. Thus allow to quickly react in order to prevent the flooding attacks from strangling the victim server and its access network.
Osman Salem +3 more
openaire +2 more sources
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification [PDF]
Overlay multicast networks are used by service providers to distribute contents such as Web pages, static and streaming multimedia data, or security updates to a large number of users. However, such networks are extremely vulnerable to message-dropping attacks by malicious or selfish nodes that intentionally drop the packets they are required to ...
Liang Xie 0002, Sencun Zhu
openaire +1 more source

