Sciweavers

54 search results - page 1 / 11
» Traffic Analysis Based Identification of Attacks
Sort
View
IJCSA
2008
60views more  IJCSA 2008»
13 years 4 months ago
Traffic Analysis Based Identification of Attacks
Dima Novikov, Roman V. Yampolskiy, Leon Reznik
GLOBECOM
2009
IEEE
13 years 8 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
PERCOM
2006
ACM
14 years 3 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
ICC
2008
IEEE
118views Communications» more  ICC 2008»
13 years 10 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
ESORICS
2007
Springer
13 years 8 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright