نتایج جستجو برای: level attack

تعداد نتایج: 1152212  

2012
Akshita Rana Deepak

The proper management of wireless mesh network is a challenging task due to the mobility of node and velocity of node. All devices work in open channel area due to this security is very challenging task. Because due to mobility and open channel area possibility of threats and attacks are very high. On the basis of related work we found data wormhole attack is a serious attack in the environment...

Journal: :CoRR 2005
Gianni Tedesco Uwe Aickelin

­ Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, is difficult to analyze. Intrusion alert correlation is the task of automating some of this analysis by grouping related alerts together. Attack graphs provide an intuitive model for such analys...

2008
Li Wang Ali Ghorbani Yao Li

Current techniques employed in security alert correlation area for multi-step attack recognition purpose are intricate to be performed due to the complexity of the methods and huge computing workload generated during alert analysis and processing. In this paper, we proposed a new method of alert correlation aiming at providing concentrated security event information and thus finding multi-step ...

2017
Michelina Pusceddu Ignazio Floris Franco Buffa Emanuele Salaris Alberto Satta

Predator-prey relationships between sympatric species allow the evolution of defense behaviors, such as honeybee colonies defending their nests against predatory wasps. We investigated the predator-prey relationship between the honeybee (Apis mellifera ligustica) and the European wasp (Vespula germanica) by evaluating the effectiveness of attack and defense behaviors, which have coevolved in th...

2018
Florian Kammuller

In this paper, we present a proof theory for attack trees. Attack trees are a well established and useful model for the construction of attacks on systems since they allow a stepwise exploration of high level attacks in application scenarios. Using the expressiveness of Higher Order Logic in Isabelle, we succeed in developing a generic theory of attack trees with a state-based semantics based o...

Journal: :Karbala international journal of modern science 2022

Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion ...

2007
Vyas Sekar Yinglian Xie Michael K. Reiter Hui Zhang

Epidemic-spreading attacks (e.g., worm and botnet propagation) have a natural notion of attack causality – a single network flow causes a victim host to get infected and subsequently spread the attack. This paper is motivated by a simple question regarding the diagnosis of such attacks – is it possible to establish attack-causality through network-level monitoring, without relying on signatures...

2008
Steven Noel Sushil Jajodia

We describe the optimal placement of intrusion detection system (IDS) sensors and prioritization of IDS alarms, using attack graph analysis. Our attack graphs predict the various possible ways of penetrating a network to reach critical assets. In particular, automated analysis of network configuration and attacker exploits provides an attack graph showing all possible paths to critical assets. ...

2016
Se Yun Kwon Kyung Seop Lee Jun Nyung Lee Yun-Sok Ha Seock Hwan Choi Hyun Tae Kim Tae-Hwan Kim Eun Sang Yoo Tae Gyun Kwon

PURPOSE We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. MATERIALS AND METHODS Data from 53 patients diagnosed with pheochromocytoma ...

2015
Priya Maheshwari Leenu Singh

MANETs are more susceptible to attacks than a wired network. High mobility, lack of central administration, etc. are some of the main causes. One of the DOS attacks known as Jellyfish Attack is difficult to analyze as well as to detect in MANETs as Jellyfisher nodes follow all the protocol rules. There are mainly three classes of jellyfish attacks named as a Jellyfish Reorder Attack, Jellyfish ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید