Sciweavers

2503 search results - page 1 / 501
» Building Computer Network Attacks
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 5 months ago
Building Computer Network Attacks
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack...
Ariel Futoransky, Luciano Notarfrancesco, Gerardo ...
ACSAC
2004
IEEE
13 years 9 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ICNS
2007
IEEE
13 years 11 months ago
A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks
—Application layer DDoS attacks, which are legitimate in packets and protocols, gradually become a pressing problem for commerce, politics and military. We build an attack model ...
Jie Yu, Zhoujun Li, Huowang Chen, Xiaoming Chen
USS
2010
13 years 3 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 4 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...