Sciweavers

1112 search results - page 19 / 223
» On scalable attack detection in the network
Sort
View
ICNP
2009
IEEE
14 years 7 months ago
Memory Efficient Protocols for Detecting Node Replication Attacks in Wireless Sensor Networks
Sensor networks deployed in hostile areas are subject to node replication attacks, in which an adversary compromises a few sensors, extracts the security keys, and clones them in a...
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelia...
CNSR
2006
IEEE
139views Communications» more  CNSR 2006»
15 years 3 months ago
Genetic Programming Based WiFi Data Link Layer Attack Detection
This paper presents a genetic programming based detection system for Data Link layer attacks on a WiFi network. We explore the use of two different fitness functions in order to ...
Patrick LaRoche, A. Nur Zincir-Heywood
76
Voted
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
GLOBECOM
2009
IEEE
15 years 1 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
SAINT
2003
IEEE
15 years 2 months ago
Challenges in Intrusion Detection for Wireless Ad-hoc Networks
This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detectio...
Paul Brutch, Calvin Ko