Sciweavers

1028 search results - page 35 / 103
» Using Attack Graphs to Design Systems
Sort
View
97 views 105 votes 15 years 1 months ago  CCR 2005»
This paper focuses on "router-based" defense mechanisms, and whether they can provide effective solutions to network Denialof-Service (DoS) attacks. Router-based defense...
198 views 111 votes 15 years 8 days ago  CCS 2010»
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
157 views 103 votes 15 years 7 months ago  SIGCOMM 2006»
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
222 views 120 votes 13 years 9 months ago  COMSNETS 2012»
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
102 views 102 votes 15 years 7 months ago  MMSEC 2006»
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
228 views 119 votes 15 years 1 months ago  CCS 2010»
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
113 views 95 votes 15 years 7 months ago  DSN 2007»
The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) atta...
166 views 96 votes 16 years 1 months ago  SIGMOD 2001»
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
154 views 119 votes 15 years 7 months ago  PETRA 2009»
This paper describes a personalised rehabilitation application using a smart phone (PDA) and wireless (bio) sensors. It instructs and motivates patients to follow their exercise p...
188 views 115 votes 15 years 7 months ago  CEEMAS 2007»
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...