Sciweavers

1028 search results - page 9 / 103
» Using Attack Graphs to Design Systems
Sort
View
122 views 112 votes 15 years 5 months ago  ESSOS 2009»
Injection attacks and their defense require a lot of creativity from attackers and secure system developers. Unfortunately, as attackers rely increasingly on systematic approaches ...
170 views 105 votes 16 years 1 months ago  KDD 2006»
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
151 views 110 votes 15 years 6 months ago  ICICS 2005»
This paper presents PCAV (Parallel Coordinates Attack Visualizer), a real-time visualization system for detecting large-scale Internet attacks including Internet worms, DDoS attack...
166 views 108 votes 15 years 3 months ago  CCS 2008»
Software cache-based side channel attacks present a serious threat to computer systems. Previously proposed countermeasures were either too costly for practical use or only effect...
145 views 133 votes 15 years 7 months ago  INFOCOM 2007»
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
117 views 94 votes 15 years 6 months ago  NDSS 2005»
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
104 views 70 votes 15 years 8 months ago  CSE 2009»
—This paper contributes to the field of measuring (un)linkability in communication systems; a subproblem of privacy protection. We propose an attacker state model for attacks on...
106 views 94 votes 15 years 7 months ago  SRDS 2006»
The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a we...
130 views 120 votes 15 years 7 months ago  SSS 2007»
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
121 views 84 votes 15 years 5 months ago  DAC 1994»
In this paper, we present a design methodology management system, which assists designers in selecting a suitable design process and invoking the selected sequence of tools on the...