Sciweavers

5 search results - page 1 / 1
» Genetic Programming Based WiFi Data Link Layer Attack Detect...
Sort
View
CNSR
2006
IEEE
139views Communications» more  CNSR 2006»
13 years 11 months ago
Genetic Programming Based WiFi Data Link Layer Attack Detection
This paper presents a genetic programming based detection system for Data Link layer attacks on a WiFi network. We explore the use of two different fitness functions in order to ...
Patrick LaRoche, A. Nur Zincir-Heywood
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
13 years 11 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
JDFP
2006
109views more  JDFP 2006»
13 years 5 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...
TON
2012
11 years 7 months ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 5 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan