Sciweavers

412 search results - page 69 / 83
» Intrusion Detection for an On-Going Attack
Sort
View
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
WSC
2007
14 years 11 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
IJNSEC
2007
171views more  IJNSEC 2007»
14 years 9 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
95
Voted
COMCOM
2007
106views more  COMCOM 2007»
14 years 9 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
DSN
2007
IEEE
15 years 3 months ago
A Firewall for Routers: Protecting against Routing Misbehavior
In this work, we present the novel idea of route normalization by correcting on the fly routing traffic on behalf of a local router to protect the local network from malicious a...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang