Results 231 to 240 of about 290,193 (257)
Some of the next articles are maybe not open access.
Network-Based Dictionary Attack Detection
2009 International Conference on Future Networks, 2009This paper describes the novel network-based approach to a dictionary attack detection with the ability to recognize successful attack. We analyzed SSH break-in attempts at a flow level and determined a dictionary attack pattern. This pattern was verified and compared to common SSH traffic to prevent false positives.
Jan Vykopal +2 more
openaire +1 more source
Computer, 1997
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire +1 more source
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire +1 more source
Research of network attacks detection methods
Issues of radio electronics, 2019This paper reviews existing methods of network attacks detecting. A brief description of methods, their main features, advantages and disadvantages are given in accordance with the generally accepted classification of detection methods. During the initial analysis evidently inappropriate methods for this study were pointed out.
P. V. Frolov +2 more
openaire +1 more source
Brute Force Network Attack Detection through Neural Networks
2021 XXX International Scientific Conference Electronics (ET), 2021Intrusion Detection and Prevention Systems (IDPS) are widely used to detect and prevent network intrusions. In this article, we apply a Multi Level Perceptron (MLP) Artificial Neural Network (ANN) implemented in “neuralnet” R package to distinguish normal traffic from Brute Force attack traffic using a specific dataset.
R. Trifonov, D. Gotseva, P. Stoynov
openaire +1 more source
Detecting network attacks using behavioural models
Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011In this paper we're dealing with the problem of detecting malware using behaviour model. For better malware description we have divided this model into two parts — malware spreading model and malware statistical behavioural model. Spreading models are typical epidemiological models like SI model, advanced SIR and SEIR models and empiric file spreading ...
Jiri Schafer, Michal Drozd
openaire +1 more source
IPv6 Network Attack Detection with HoneydV6
2014During 2012, we conducted a long term IPv6-darknet experiment. We observed a relatively high number of interesting events and therefore needed additional network security tools to capture and analyse potentially harmful IPv6 traffic. This paper presents HoneydV6, a low-interaction IPv6 honeypot that can simulate entire IPv6 networks and which may be ...
Sven Schindler +4 more
openaire +1 more source
Network Dominating Attack Detection and Mitigation
2018 Conference on Information and Communication Technology (CICT), 2018In this paper, we address the issue of network dominating attack through which a malicious user tries to grab an unfair share of bandwidth. In this attack, malicious senders on receiving the congestion indication, increase their congestion window instead of decreasing.
Jincy Johny, Mahendra Pratap Singh
openaire +1 more source
Attack detection in unattended sensor networks
SPIE Proceedings, 2010Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while ...
Curt Wu +4 more
openaire +1 more source
Collusion Attack Detection in Networked Systems
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016Security protocols have been commonly used to protect secure communication in networked systems. It is often assumed that individual wireless nodes or leaders in a system are sincere and use techniques (authentication, permission, etc.) of these protocols to have secure communications.
Md Zakirul Alam Bhuiyan, Jie Wu
openaire +1 more source
Intrusion Detection and Network-Based Attacks
2020This second of two chapters on network security complements Chapter 10’s treatment of firewalls and tunnels. Here we discuss intrusion detection and various tools for network monitoring (packet sniffing) and vulnerability assessment, followed by denial of service and other network-based attacks that exploit standard TCP/IP network or Ethernet protocols.
openaire +1 more source

