Sciweavers

1028 search results - page 10 / 103
» Using Attack Graphs to Design Systems
Sort
View
117 views 95 votes 15 years 6 months ago  NDSS 2005»
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
104 views 70 votes 15 years 8 months ago  CSE 2009»
—This paper contributes to the field of measuring (un)linkability in communication systems; a subproblem of privacy protection. We propose an attacker state model for attacks on...
106 views 94 votes 15 years 7 months ago  SRDS 2006»
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
130 views 120 votes 15 years 7 months ago  SSS 2007»
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
121 views 84 votes 15 years 5 months ago  DAC 1994»
In this paper, we present a design methodology management system, which assists designers in selecting a suitable design process and invoking the selected sequence of tools on the...
197 views 118 votes 15 years 1 months ago  CCS 2010»
We systematically study the design of image recognition CAPTCHAs (IRCs) in this paper. We first review and examine all IRCs schemes known to us and evaluate each scheme against th...
142 views 91 votes 15 years 7 months ago  ICDCSW 2008»
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important problem and many unfair rat...
156 views 129 votes 15 years 6 months ago  KBSE 2005»
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
92 views 102 votes 15 years 7 months ago  SASO 2008»
Many real–world networks show a scale–free degree distribution, a structure that is known to be very stable in case of random failures. Unfortunately, the very same structure ...
90 views 98 votes 15 years 2 months ago  PST 2004»
All information systems can be represented by a conceptual and abstracted systems diagram. Therefore all attacks against information systems can also be ted. By studying the securi...