Sciweavers

Share
WWW
2011
ACM
8 years 10 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
INFORMATICASI
2010
9 years 1 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
GLOBECOM
2010
IEEE
9 years 1 months ago
Cross-Layer Attack and Defense in Cognitive Radio Networks
The existing research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily re...
Wenkai Wang, Yan Sun, Husheng Li, Zhu Han
JCP
2007
127views more  JCP 2007»
9 years 3 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
9 years 5 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...
SIGMETRICS
2005
ACM
147views Hardware» more  SIGMETRICS 2005»
9 years 9 months ago
Denial-of-service resilience in peer-to-peer file sharing systems
Peer-to-peer (p2p) file sharing systems are characterized by highly replicated content distributed among nodes with enormous aggregate resources for storage and communication. Th...
Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzma...
SSS
2009
Springer
143views Control Systems» more  SSS 2009»
9 years 10 months ago
Self Adaptive High Interaction Honeypots Driven by Game Theory
High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction pote...
Gérard Wagener, Radu State, Alexandre Dulau...
FC
2009
Springer
135views Cryptology» more  FC 2009»
9 years 10 months ago
Blue versus Red: Towards a Model of Distributed Security Attacks
Abstract. This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strateg...
Neal Fultz, Jens Grossklags
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
9 years 10 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
books