Sciweavers

231 search results - page 15 / 47
» A Host-Based Approach to Network Attack Chaining Analysis
Sort
View
ICDCSW
2003
IEEE
15 years 2 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
INFOCOM
2010
IEEE
14 years 8 months ago
Queuing Analysis in Multichannel Cognitive Spectrum Access: A Large Deviation Approach
Abstract—The queueing performance of a (secondary) cognitive user is investigated for a hierarchical network where there are N independent and identical primary users. Each prima...
Amine Laourine, Shiyao Chen, Lang Tong
INFOCOM
2011
IEEE
14 years 1 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
JSW
2008
98views more  JSW 2008»
14 years 9 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
ICICS
2009
Springer
15 years 4 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson