Sciweavers

642 search results - page 18 / 129
» Detecting Spoofed Packets
Sort
View
IEEEARES
2010
IEEE
15 years 5 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
GLOBECOM
2006
IEEE
15 years 5 months ago
A New MAC Protocol for Wireless Packet Networks
— Medium access control (MAC) protocols for wireless packet networks usually need to be distributed for flexibility and robustness. In a distributed way, however, collision dete...
Jun Peng, Liang Cheng, Biplab Sikdar
CONEXT
2008
ACM
15 years 1 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig
CCECE
2006
IEEE
15 years 5 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...
MOBIQUITOUS
2005
IEEE
15 years 5 months ago
Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks
This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-tempo...
Sapon Tanachaiwiwat, Ahmed Helmy