Results 251 to 260 of about 291,448 (281)
Some of the next articles are maybe not open access.
Detection of Masquerade Attacks on Wireless Sensor Networks
2007 IEEE International Conference on Communications, 2007We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like coverage, connectivity, data aggregation and specific communication patterns. The two proposed techniques complement each other when used concurrently.
Vijay Bhuse +2 more
openaire +1 more source
Network Topology Effects on the Detectability of Crossfire Attacks
IEEE Transactions on Information Forensics and Security, 2018New strains of distributed denial-of-service (DDoS) attacks have exhibited potential to disconnect communication networks, even cutting off entire countries from the Internet. The “crossfire” is a new, indirect DDoS link-flooding attack, which masks itself as natural congestion, making it very hard to counter.
Christos Liaskos, Sotiris Ioannidis
openaire +1 more source
Location Spoofing Attack Detection in Wireless Networks
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010While significant research effort has been dedicated to wireless localization over the past decades, most aspects of location security have been overlooked. In particular, adversaries can take advantage of security vulnerabilities of current location systems to launch location spoofing attacks, thus disguising their position in the network.
Jeong Heon Lee, R. Michael Buehrer
openaire +1 more source
Network attack detection and classification by the F-transform
2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2015We solve the problem of network attack detection and classification. We discuss the way of generation and simulation of an artificial network traffic data. We propose an efficient algorithm for data classification that is based on the F-transform technique.
Petr Hurtík +4 more
openaire +1 more source
Detecting Insider Attacks in Blockchain Networks
2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021Oluwaseyi Ajayi, Tarek N. Saadawi
openaire +1 more source
Snort Rule Detection for Countering in Network Attacks
2017Phones are turning into the surely understood method for relationship; strategies helping adaptability connote a genuine asset of issues in light of the fact that their preparatory style did not execute effective assurance. A novel structure work of turn imperceptible framework strikes, known as versatility-based avoidance, where an adversary ...
Somu Venkateswarlu +3 more
openaire +1 more source
Efficient Network Monitoring for Attack Detection.
2011Techniques for network-based intrusion detection have been evolving for years, and the focus of most research is on detection algorithms, although networks are distributed and dynamically managed nowadays. A data processing framework is required that allows to embed multiple detection techniques and to provide data with the needed aggregation levels ...
openaire +2 more sources
Botnet Attack Detection Approach in IoT Networks
Automatic Control and Computer Sciences, 2022Tatiana M. Tatarnikova +3 more
openaire +1 more source
A novel architecture for web-based attack detection using convolutional neural network
Computers and Security, 2021Adem Tekerek
exaly

