Results 241 to 250 of about 290,193 (257)
Some of the next articles are maybe not open access.

Detecting wormhole attacks in wireless networks

2006 2nd IEEE Workshop on Wireless Mesh Networks, 2006
We study and propose a novel algorithm for detecting Wormhole Attacks in wireless ad hoc and sensor networks. The algorithm uses only local connectivity information and utilizes disk packing argument to detect such attacks. The success of the detection algorithm depends on the density of nodes in the network.
Ritesh Maheshwari, Tie Gao, Samir Das
openaire   +1 more source

Network attacks detection using fuzzy logic

2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015
The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The approach is based on network monitoring of the variables characteristic of different network anomalies, such as ratio of the incoming traffic to the outgoing, packet size, etc ...
D. K. Levonevskiy   +2 more
openaire   +1 more source

Attack detection in all-optical networks

Optical Networks and Their Applications, 1998
Summary form only given. Summary form only given. All-optical networks (AONs) may be attacked by nefarious users that misuse the network to disrupt the normal operations of nodes in the AON. Such attacks differ from failures and must therefore be treated differently.
M. Medard, S.R. Chinn, P. Saengudomlert
openaire   +1 more source

ZigBee Wireless Network Attack and Detection

2021
With the large-scale use of ZigBee technology in industry and smart home system, the security problems of ZigBee emerge gradually. And people pay more and more attention to ZigBee security. In view of the lack of a mature ZigBee attack detection product in the market, this paper will research on ZigBee and design a simple ZigBee attack detection system.
openaire   +1 more source

Detecting Insider Attacks in Blockchain Networks

2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021
Oluwaseyi Ajayi, Tarek Saadawi
openaire   +1 more source

Impersonation Attack Detection in IoT Networks

GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2022
Dinh Duc Nha Nguyen   +4 more
openaire   +1 more source

Intrusion Detection System for Network Attacks

International Journal for Research in Applied Science and Engineering Technology
Network security has become a top priority for both businesses and individuals in recent years because of the rise in cyber threats. Finding unauthorized or harmful activities on a network is one of the biggest problems. Traditional Intrusion Detection Systems (IDS) often miss new or changing attack patterns because they use fixed rules or known attack
openaire   +1 more source

Efficient Network Monitoring for Attack Detection

2011
Techniques for network-based intrusion detection have been evolving for years, and the focus of most research is on detection algorithms, although networks are distributed and dynamically managed nowadays. A data processing framework is required that allows to embed multiple detection techniques and to provide data with the needed aggregation levels ...
openaire   +1 more source

DETECTING NETWORK ATTACKS AT FLOW LEVEL

Telecommunications and Radio Engineering, 2013
A. A. Galtsev, A. M. Sukhov
openaire   +1 more source

Network Attack Detection and Defense

PIK - Praxis der Informationsverarbeitung und Kommunikation, 2012
openaire   +1 more source

Home - About - Disclaimer - Privacy