Detection of malicious consumer interest packet with dynamic threshold values

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Phishing with Consumer Electronics - Malicious Home Routers

This short paper describes an attack that exploits the online marketplace’s susceptibility to covert fraud, opaqueness of embedded software, and social engineering to hijack account access and ultimately steal money. The attacker introduces a fatal security flaw into a trusted embedded system (e.g. computer motherboard, network interface card, network router, cell phone), distributes it through...

متن کامل

On Signature Schemes with Threshold Veriication Detecting Malicious Veriiers on Signature Schemes with Threshold Veriication Detecting Malicious Veriiers

While in the ordinary digital signature model one veriier is suucient to check the validity of a given signature, there are situations in which only t out of a group of n veriiers should be able to verify the signatures. These veriiers can either be anonymous, non-anonymous or convertible non-anonymous. So far, only schemes for the anonymous shared veriication signature concept have been sugges...

متن کامل

Dynamic Competition with Consumer Inertia Dynamic Competition with Consumer Inertia

We study a framework where two duopolists compete repeatedly in prices and where chosen prices potentially affect future market shares, but certainly do not affect current sales. This assumption of consumer inertia causes (noncooperative) coordination on high prices only to be possible as an equilibrium for low values of the discount factor. In particular, high discount factors increase opportu...

متن کامل

Efficient way of Detecting Malicious Packet Losses

We consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, we are concerned with a simple yet effective attack in which a router selectively drops packets destined for some Victim. Unfortunately, it is quite challenging to attribute a missing packet to a malicious action because normal network congestion can produce the sa...

متن کامل

Automatic Detection of Malicious PDF Files Using Dynamic Analysis

Malicious non-executable files are being increasingly used to break into users’ computers. Anti-virus solutions fail to detect all the malicious files. We propose using machine learning to process the reports generated by a dynamic analysis system. We implement a preliminary model, and despite its simplicity, we achieved a 97.45% prediction accuracy. The model can be further improved to reach a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PeerJ Computer Science

سال: 2021

ISSN: 2376-5992

DOI: 10.7717/peerj-cs.435