Results 231 to 240 of about 291,448 (281)
Some of the next articles are maybe not open access.

Network Attack Detection and Mitigation

2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015
Resource exhaustion attacks or denial of service attacks (DoS) have emerged as a major way to compromise the availability of servers and interrupt legitimate online services. IP trace back refers to the problem of identifying the source of such attacks. Packet marking is a general technique to trace back attackers. The main idea in packet marking is to
Sangita Roy, Ashok Singh Sairam
openaire   +1 more source

Detection of network attacks using of growing pyramid networks

2021 10th Mediterranean Conference on Embedded Computing (MECO), 2021
The paper presents a method of rapid detection of attacks to ensure network security, using a method of a growing pyramid network, which allows you to combine statistical and signature methods of detecting anomalies of network traffic.
Yulia A. Shichkina, Roza R. Fatkieva
openaire   +1 more source

Collusion Attack Detection in Networked Systems

2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016
Security protocols have been commonly used to protect secure communication in networked systems. It is often assumed that individual wireless nodes or leaders in a system are sincere and use techniques (authentication, permission, etc.) of these protocols to have secure communications.
Md. Zakirul Alam Bhuiyan, Jie Wu 0001
openaire   +1 more source

Detection of Attacks in Wireless Mesh Networks

2011 5th Latin-American Symposium on Dependable Computing, 2011
Wireless Mesh Network (WMN) is a new technology that is gaining importance among traditional wireless communication systems. Wireless Mesh Networks are becoming a reasonable choice to offer Internet access in an inexpensive, convenient, and quick way. However, WMNs are vulnerable to several kinds of attacks because of their inherent attributes such as ...
Anderson Nunes Paiva Morais   +1 more
openaire   +1 more source

Network Attack Detection based on Domain Attack Behavior Analysis

2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2020
Network security has become an important issue in our work and life. Hackers' attack mode has been upgraded from normal attack to APT( Advanced Persistent Threat, APT) attack. The key of APT attack chain is the penetration and intrusion of active directory, which can not be completely detected via the traditional IDS and antivirus software.
Weifeng Wang   +5 more
openaire   +1 more source

Detecting attacks on networks

Computer, 1997
As Internet based and intranet based network systems have evolved, they have become invaluable tools that businesses can use to share information and conduct business with online partners. However, hackers have also learned to use these systems to access private networks and their resources.
openaire   +1 more source

Attack detection in large networks

Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2002
Attacks on large networks are detected using their inherent statistical characteristics. Emphasis is on detecting attacks on the network instead of attacks on computers attached to the network. Denial-of-Service (DoS) attacks and attacks on network components such as routers are detected.
J. May, J. Peterson, J. Bauman
openaire   +1 more source

Detection of Sybil Attacks in Social Networks

2020
The advent of the Internet revolutionized communication between people in different geographical locations. It has brought about a reduction in the turnaround time, for exchange of information between people, from days to seconds. Social networks have become an important part of life.
Allan Lobo   +3 more
openaire   +1 more source

IPv6 Network Attack Detection with HoneydV6

2014
During 2012, we conducted a long term IPv6-darknet experiment. We observed a relatively high number of interesting events and therefore needed additional network security tools to capture and analyse potentially harmful IPv6 traffic. This paper presents HoneydV6, a low-interaction IPv6 honeypot that can simulate entire IPv6 networks and which may be ...
Sven Schindler   +4 more
openaire   +1 more source

An approach to detect network attacks applied for network forensics

2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2014
Network forensics is addressed to deal with cybercrime. The main purpose of a network forensics system is reconstructing evidences of network attacks. In order to reconstruct evidence, the network attack is firstly identified. Therefore, network attack detection solutions play an important role in network forensics.
Khoa Nguyen 0004   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy