Results 231 to 240 of about 291,448 (281)
Some of the next articles are maybe not open access.
Network Attack Detection and Mitigation
2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to
Sangita Roy, Ashok Singh Sairam
openaire +1 more source
Detection of network attacks using of growing pyramid networks
2021 10th Mediterranean Conference on Embedded Computing (MECO), 2021The paper presents a method of rapid detection of attacks to ensure network security, using a method of a growing pyramid network, which allows you to combine statistical and signature methods of detecting anomalies of network traffic.
Yulia A. Shichkina, Roza R. Fatkieva
openaire +1 more source
Collusion Attack Detection in Networked Systems
2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016Security protocols have been commonly used to protect secure communication in networked systems. It is often assumed that individual wireless nodes or leaders in a system are sincere and use techniques (authentication, permission, etc.) of these protocols to have secure communications.
Md. Zakirul Alam Bhuiyan, Jie Wu 0001
openaire +1 more source
Detection of Attacks in Wireless Mesh Networks
2011 5th Latin-American Symposium on Dependable Computing, 2011Wireless Mesh Network (WMN) is a new technology that is gaining importance among traditional wireless communication systems. Wireless Mesh Networks are becoming a reasonable choice to offer Internet access in an inexpensive, convenient, and quick way. However, WMNs are vulnerable to several kinds of attacks because of their inherent attributes such as ...
Anderson Nunes Paiva Morais +1 more
openaire +1 more source
Network Attack Detection based on Domain Attack Behavior Analysis
2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2020Network security has become an important issue in our work and life. Hackers' attack mode has been upgraded from normal attack to APT( Advanced Persistent Threat, APT) attack. The key of APT attack chain is the penetration and intrusion of active directory, which can not be completely detected via the traditional IDS and antivirus software.
Weifeng Wang +5 more
openaire +1 more source
Computer, 1997
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire +1 more source
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire +1 more source
Attack detection in large networks
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2002Attacks on large networks are detected using their inherent statistical characteristics. Emphasis is on detecting attacks on the network instead of attacks on computers attached to the network. Denial-of-Service (DoS) attacks and attacks on network components such as routers are detected.
J. May, J. Peterson, J. Bauman
openaire +1 more source
Detection of Sybil Attacks in Social Networks
2020The advent of the Internet revolutionized communication between people in different geographical locations. It has brought about a reduction in the turnaround time, for exchange of information between people, from days to seconds. Social networks have become an important part of life.
Allan Lobo +3 more
openaire +1 more source
IPv6 Network Attack Detection with HoneydV6
2014During 2012, we conducted a long term IPv6-darknet experiment. We observed a relatively high number of interesting events and therefore needed additional network security tools to capture and analyse potentially harmful IPv6 traffic. This paper presents HoneydV6, a low-interaction IPv6 honeypot that can simulate entire IPv6 networks and which may be ...
Sven Schindler +4 more
openaire +1 more source
An approach to detect network attacks applied for network forensics
2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014Network forensics is addressed to deal with cybercrime. The main purpose of a network forensics system is reconstructing evidences of network attacks. In order to reconstruct evidence, the network attack is firstly identified. Therefore, network attack detection solutions play an important role in network forensics.
Khoa Nguyen 0004 +3 more
openaire +1 more source

