Sciweavers

2503 search results - page 13 / 501
» Building Computer Network Attacks
Sort
View
CONEXT
2008
ACM
15 years 3 months ago
Distributed detection of large-scale attacks in the internet
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
Thomas Gamer
NDSS
1998
IEEE
15 years 5 months ago
Attack Detection Methods for All-Optical Networks
This paper focuses on theoretical methods for detecting intentional attacks upon the infrastructure of an all-optical network. Applications of existing methods used in traditional...
Muriel Médard, Douglas Marquis, Stephen R. ...
SEC
2003
15 years 2 months ago
Statistical Disclosure Attacks
Abstract An improvement over the previously known disclosure attack is presented that allows, using statistical methods, to effectively deanonymize users of a mix system. Furtherm...
George Danezis
NDSS
2002
IEEE
15 years 6 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
LCN
2005
IEEE
15 years 6 months ago
A Novel Tuneable Low-Intensity Adversarial Attack
— Currently, Denial of Service (DoS) attacks remain amongst the most critical threats to Internet applications. The goal of the attacker in a DoS attack is to overwhelm a shared ...
Salil S. Kanhere, Anjum Naveed