Sciweavers

JCS
2006
81views more  JCS 2006»
13 years 4 months ago
Effective worm detection for various scan techniques
In recent years, the threats and damages caused by active worms have become more and more serious. In order to reduce the loss caused by fastspreading active worms, an effective de...
Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, ...
INFOCOM
2002
IEEE
13 years 9 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
GLOBECOM
2007
IEEE
13 years 11 months ago
Wavelet Based Detection of Shadow Fading in Wireless Networks
— In wireless communications, shadow fading can cause at least 6 dB power loss for 10% of the time [1]. Early detection of shadow fading plays an important part in facilitating t...
Xiaobo Long, Biplab Sikdar
APNOMS
2009
Springer
13 years 11 months ago
Attack Model and Detection Scheme for Botnet on 6LoWPAN
Recently, Botnet has been used to launch spam-mail, key-logging, and DDoS attacks. Botnet is a network of bots which are controlled by attacker. A lot of detection mechanisms have ...
Eung Jun Cho, Jin Ho Kim, Choong Seon Hong