Sciweavers

94 search results - page 10 / 19
» Detecting Denial of Service Attacks in Tor
Sort
View
89
Voted
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 6 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
GLOBECOM
2006
IEEE
15 years 5 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
ICC
2009
IEEE
233views Communications» more  ICC 2009»
15 years 6 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
15 years 5 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
IJIPT
2010
147views more  IJIPT 2010»
14 years 10 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj