Sciweavers

347 search results - page 34 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
75
Voted
CCS
2006
ACM
15 years 1 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
ECSA
2010
Springer
14 years 11 months ago
On the effectiveness of the metamorphic shield
In this paper we analyze the effectiveness of dynamic artificial diversity, i.e., artificial diversity in which the subject of the diversity is re-randomized periodically. We refer...
Anh Nguyen-Tuong, Andrew Wang, Jason Hiser, John C...
DSN
2007
IEEE
15 years 1 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...
PAM
2012
Springer
13 years 5 months ago
Re-wiring Activity of Malicious Networks
This paper studies the AS-level re-wiring dynamics (changes in the connectivity) of malicious networks. Anecdotal evidence suggests that some malicious ASes that are primarily invo...
Maria Konte, Nick Feamster
BROADNETS
2007
IEEE
15 years 4 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty