Detection of malicious consumer interest packet with dynamic threshold values
نویسندگان
چکیده
منابع مشابه
Phishing with Consumer Electronics - Malicious Home Routers
This short paper describes an attack that exploits the online marketplace’s susceptibility to covert fraud, opaqueness of embedded software, and social engineering to hijack account access and ultimately steal money. The attacker introduces a fatal security flaw into a trusted embedded system (e.g. computer motherboard, network interface card, network router, cell phone), distributes it through...
متن کاملOn Signature Schemes with Threshold Veriication Detecting Malicious Veriiers on Signature Schemes with Threshold Veriication Detecting Malicious Veriiers
While in the ordinary digital signature model one veriier is suucient to check the validity of a given signature, there are situations in which only t out of a group of n veriiers should be able to verify the signatures. These veriiers can either be anonymous, non-anonymous or convertible non-anonymous. So far, only schemes for the anonymous shared veriication signature concept have been sugges...
متن کاملDynamic Competition with Consumer Inertia Dynamic Competition with Consumer Inertia
We study a framework where two duopolists compete repeatedly in prices and where chosen prices potentially affect future market shares, but certainly do not affect current sales. This assumption of consumer inertia causes (noncooperative) coordination on high prices only to be possible as an equilibrium for low values of the discount factor. In particular, high discount factors increase opportu...
متن کاملEfficient way of Detecting Malicious Packet Losses
We consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some Victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the sa...
متن کاملAutomatic Detection of Malicious PDF Files Using Dynamic Analysis
Malicious non-executable files are being increasingly used to break into users’ computers. Anti-virus solutions fail to detect all the malicious files. We propose using machine learning to process the reports generated by a dynamic analysis system. We implement a preliminary model, and despite its simplicity, we achieved a 97.45% prediction accuracy. The model can be further improved to reach a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PeerJ Computer Science
سال: 2021
ISSN: 2376-5992
DOI: 10.7717/peerj-cs.435