Results 41 to 50 of about 84,064 (194)

Mitigation Model for DDoS Attack in Wireless Sensor Networks [PDF]

open access: yes, 2015
A Denial-of-Service is an attack in which the attackers send certain messages to the target systems or target servers with a purpose and intention of shutting down those system or servers.
Gond, Shruti, Nath, Aishwarya
core  

SDNsec: Forwarding Accountability for the SDN Data Plane

open access: yes, 2016
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be
Hoefler, Torsten   +4 more
core   +1 more source

Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection [PDF]

open access: yes, 2010
Most of the MANET security research has so far focused on providing routing security and confidentiality to the data packets, but less has been done to ensure privacy and anonymity of the communicating entities.
Hota, C.   +3 more
core   +1 more source

Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

open access: yes, 2018
Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments.
Calyam, Prasad   +7 more
core   +1 more source

PROVIDE: hiding from automated network scans with proofs of identity [PDF]

open access: yes, 2016
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours.
Bestavros, Azer, Koch, William
core   +3 more sources

Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Designing wireless sensor networks (WSNs) that can work reliably in the presence of inside packet drop attackers is very challenging. Current trust mechanisms and avoidance approaches are promising but have their limitations.
Youngho Cho, Gang Qu
doaj   +1 more source

Sleep Deprivation Attack Detection in Wireless Sensor Network

open access: yes, 2012
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes.
Bhattasali, Tapalina   +2 more
core   +3 more sources

Telephony Denial of Service Defense at Data Plane (TDoSD@DP) [PDF]

open access: yes, 2018
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident ...
Febro, Aldo   +2 more
core   +2 more sources

Tuple space explosion: a denial-of-service attack against a software packet classifier

open access: yesConference on Emerging Network Experiment and Technology, 2019
Efficient and highly available packet classification is fundamental for various security primitives. In this paper, we evaluate whether the de facto Tuple Space Search (TSS) packet classification algorithm used in popular software networking stacks such ...
Levente Csikor   +8 more
semanticscholar   +1 more source

Limitations of OpenFlow Topology Discovery Protocol

open access: yes, 2017
OpenFlow Discovery Protocol (OFDP) is the de-facto protocol used by OpenFlow controllers to discover the underlying topology. In this paper, we show that OFDP has some serious security, efficiency and functionality limitations that make it non suitable ...
Azzouni, Abdelhadi   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy