Sciweavers

54 search results - page 1 / 11
» Traffic Analysis Based Identification of Attacks
Sort
View
47
Voted
IJCSA
2008
60views more  IJCSA 2008»
14 years 10 months ago
Traffic Analysis Based Identification of Attacks
Dima Novikov, Roman V. Yampolskiy, Leon Reznik
103
Voted
GLOBECOM
2009
IEEE
15 years 2 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
PERCOM
2006
ACM
15 years 9 months ago
Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks
Typical packet traffic in a sensor network reveals pronouncedpatterns that allow an adversary analyzing packet traffic to deduce the location of a base station. Once discovered, t...
Jing Deng, Richard Han, Shivakant Mishra
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 4 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
80
Voted
ESORICS
2007
Springer
15 years 2 months ago
Countering Statistical Disclosure with Receiver-Bound Cover Traffic
Anonymous communications provides an important privacy service by keeping passive eavesdroppers from linking communicating parties. However, using long-term statistical analysis of...
Nayantara Mallesh, Matthew Wright