Results 251 to 260 of about 291,448 (281)
Some of the next articles are maybe not open access.

Detection of Masquerade Attacks on Wireless Sensor Networks

2007 IEEE International Conference on Communications, 2007
We propose two lightweight techniques to detect masquerade attacks on wireless sensor networks (WSN). Our solutions take into consideration, important WSN properties like coverage, connectivity, data aggregation and specific communication patterns. The two proposed techniques complement each other when used concurrently.
Vijay Bhuse   +2 more
openaire   +1 more source

Network Topology Effects on the Detectability of Crossfire Attacks

IEEE Transactions on Information Forensics and Security, 2018
New strains of distributed denial-of-service (DDoS) attacks have exhibited potential to disconnect communication networks, even cutting off entire countries from the Internet. The “crossfire” is a new, indirect DDoS link-flooding attack, which masks itself as natural congestion, making it very hard to counter.
Christos Liaskos, Sotiris Ioannidis
openaire   +1 more source

Location Spoofing Attack Detection in Wireless Networks

2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
While significant research effort has been dedicated to wireless localization over the past decades, most aspects of location security have been overlooked. In particular, adversaries can take advantage of security vulnerabilities of current location systems to launch location spoofing attacks, thus disguising their position in the network.
Jeong Heon Lee, R. Michael Buehrer
openaire   +1 more source

Network attack detection and classification by the F-transform

2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 2015
We solve the problem of network attack detection and classification. We discuss the way of generation and simulation of an artificial network traffic data. We propose an efficient algorithm for data classification that is based on the F-transform technique.
Petr Hurtík   +4 more
openaire   +1 more source

Detecting Insider Attacks in Blockchain Networks

2021 International Symposium on Networks, Computers and Communications (ISNCC), 2021
Oluwaseyi Ajayi, Tarek N. Saadawi
openaire   +1 more source

Snort Rule Detection for Countering in Network Attacks

2017
Phones are turning into the surely understood method for relationship; strategies helping adaptability connote a genuine asset of issues in light of the fact that their preparatory style did not execute effective assurance. A novel structure work of turn imperceptible framework strikes, known as versatility-based avoidance, where an adversary ...
Somu Venkateswarlu   +3 more
openaire   +1 more source

Efficient Network Monitoring for Attack Detection.

2011
Techniques for network-based intrusion detection have been evolving for years, and the focus of most research is on detection algorithms, although networks are distributed and dynamically managed nowadays. A data processing framework is required that allows to embed multiple detection techniques and to provide data with the needed aggregation levels ...
openaire   +2 more sources

Botnet Attack Detection Approach in IoT Networks

Automatic Control and Computer Sciences, 2022
Tatiana M. Tatarnikova   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy