Results 41 to 50 of about 60,380 (140)

Detection techniques of selective forwarding attacks in wireless sensor networks: a survey [PDF]

open access: yes, 2012
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack, Sybil attack, selective forwarding ...
arxiv   +1 more source

Network Fault-tolerant and Byzantine-resilient Social Learning via Collaborative Hierarchical Non-Bayesian Learning [PDF]

open access: yesarXiv, 2023
As the network scale increases, existing fully distributed solutions start to lag behind the real-world challenges such as (1) slow information propagation, (2) network communication failures, and (3) external adversarial attacks. In this paper, we focus on hierarchical system architecture and address the problem of non-Bayesian learning over networks ...
arxiv  

Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network [PDF]

open access: yesarXiv, 2014
Security is a key feature in Wireless Sensor Networks but they are prone to many kinds of attacks and one of them is Black Hole Attack. In a black hole attack all the packets are consecutively dropped which leads to the decrease in the efficiency of the network and unnecessary wastage of battery life.
arxiv  

Intrusion Detection System (IDS) : Investigating Snort Performance in Windows and Ubuntu due to Flooding Attack

open access: yesJournal of Computing Research and Innovation, 2018
Intrusion detection is an important technology that can help in managing threats and vulnerabilities in this changing environment. Computer technology is more and more ubiquitous, the penetration of computer in society is a welcome step towards ...
Abidah Mat Taib, Nur Syahirah Shayuthi
doaj  

Prevention of cyberattacks in WSN and packet drop by CI framework and information processing protocol using AI and Big Data [PDF]

open access: yesInternational Journal of Computer Networks and Wireless Communications (IJCNWC) - Vol. 08, No. 04, August 2018, pp.57-63, 2023
As the reliance on wireless sensor networks (WSNs) rises in numerous sectors, cyberattack prevention and data transmission integrity become essential problems. This study provides a complete framework to handle these difficulties by integrating a cognitive intelligence (CI) framework, an information processing protocol, and sophisticated artificial ...
arxiv  

A Bernoulli-Gaussian Physical Watermark for Detecting Integrity Attacks in Control Systems [PDF]

open access: yesarXiv, 2017
We examine the merit of Bernoulli packet drops in actively detecting integrity attacks on control systems. The aim is to detect an adversary who delivers fake sensor measurements to a system operator in order to conceal their effect on the plant. Physical watermarks, or noisy additive Gaussian inputs, have been previously used to detect several classes
arxiv  

Distributed Denial of Service (DDoS) Attacks Detection Mechanism [PDF]

open access: yes, 2012
Pushback is a mechanism for defending against Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are treated as a congestion-control problem, but because most such congestion is caused by malicious hosts not obeying traditional end-to-end congestion control, the problem must be handled by the routers.
arxiv   +1 more source

Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed [PDF]

open access: yesarXiv, 2023
The IoT is vulnerable to network attacks, and Intrusion Detection Systems (IDS) can provide high attack detection accuracy and are easily installed in IoT Servers. However, IDS are seldom evaluated in operational conditions which are seriously impaired by attack overload.
arxiv  

Invisible Flow Watermarks for Channels with Dependent Substitution, Deletion, and Bursty Insertion Errors [PDF]

open access: yesarXiv, 2013
Flow watermarks efficiently link packet flows in a network in order to thwart various attacks such as stepping stones. We study the problem of designing good flow watermarks. Earlier flow watermarking schemes mostly considered substitution errors, neglecting the effects of packet insertions and deletions that commonly happen within a network.
arxiv  

Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms [PDF]

open access: yesarXiv, 2008
In this paper we present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, we evaluate the performance of the MultiLayer Perceptron (MLP), the Linear classifier, the Gaussian Mixture Model (GMM), the Naive Bayes classifier and the Support Vector Machine (SVM). The performance of
arxiv  

Home - About - Disclaimer - Privacy