Results 241 to 250 of about 290,193 (257)
Some of the next articles are maybe not open access.
Detecting wormhole attacks in wireless networks
2006 2nd IEEE Workshop on Wireless Mesh Networks, 2006We study and propose a novel algorithm for detecting Wormhole Attacks in wireless ad hoc and sensor networks. The algorithm uses only local connectivity information and utilizes disk packing argument to detect such attacks. The success of the detection algorithm depends on the density of nodes in the network.
Ritesh Maheshwari, Tie Gao, Samir Das
openaire +1 more source
Network attacks detection using fuzzy logic
2015 XVIII International Conference on Soft Computing and Measurements (SCM), 2015The aim of research is to increase the network attack detection accuracy by means of fuzzy logic. This paper considers an approach to intrusion detection using fuzzy logic. The approach is based on network monitoring of the variables characteristic of different network anomalies, such as ratio of the incoming traffic to the outgoing, packet size, etc ...
D. K. Levonevskiy +2 more
openaire +1 more source
Attack detection in all-optical networks
Optical Networks and Their Applications, 1998Summary form only given. Summary form only given. All-optical networks (AONs) may be attacked by nefarious users that misuse the network to disrupt the normal operations of nodes in the AON. Such attacks differ from failures and must therefore be treated differently.
M. Medard, S.R. Chinn, P. Saengudomlert
openaire +1 more source
ZigBee Wireless Network Attack and Detection
2021With the large-scale use of ZigBee technology in industry and smart home system, the security problems of ZigBee emerge gradually. And people pay more and more attention to ZigBee security. In view of the lack of a mature ZigBee attack detection product in the market, this paper will research on ZigBee and design a simple ZigBee attack detection system.
openaire +1 more source
Detecting Insider Attacks in Blockchain Networks
2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021Oluwaseyi Ajayi, Tarek Saadawi
openaire +1 more source
Impersonation Attack Detection in IoT Networks
GLOBECOM 2022 - 2022 IEEE Global Communications Conference, 2022Dinh Duc Nha Nguyen +4 more
openaire +1 more source
Intrusion Detection System for Network Attacks
International Journal for Research in Applied Science and Engineering TechnologyNetwork security has become a top priority for both businesses and individuals in recent years because of the rise in cyber threats. Finding unauthorized or harmful activities on a network is one of the biggest problems. Traditional Intrusion Detection Systems (IDS) often miss new or changing attack patterns because they use fixed rules or known attack
openaire +1 more source
Efficient Network Monitoring for Attack Detection
2011Techniques for network-based intrusion detection have been evolving for years, and the focus of most research is on detection algorithms, although networks are distributed and dynamically managed nowadays. A data processing framework is required that allows to embed multiple detection techniques and to provide data with the needed aggregation levels ...
openaire +1 more source
DETECTING NETWORK ATTACKS AT FLOW LEVEL
Telecommunications and Radio Engineering, 2013A. A. Galtsev, A. M. Sukhov
openaire +1 more source
Network Attack Detection and Defense
PIK - Praxis der Informationsverarbeitung und Kommunikation, 2012openaire +1 more source

