نتایج جستجو برای: legitimate

تعداد نتایج: 10391  

Journal: :I. J. Network Security 2016
Arindom Ain Monowar H. Bhuyan Dhruba Kumar Bhattacharyya Jugal K. Kalita

A low-rate distributed denial of service (DDoS) attack has the ability to obscure its tra c because it is very similar to legitimate tra c. It can easily evade current detection mechanisms. Rank correlation measures can quantify significant di↵erences between attack tra c and legitimate traffic based on their rank values. In this paper, we use two rank correlation measures, namely, Spearmen Ran...

2009
Michael Hanlon Diego Gambetta

A legitimate state uses violence to enforce contractual agreements within its territory. Criminal organizations may enforce transactions that are legally restricted or banned, or otherwise ignored by the legitimate state. In this sense, criminal organizations may also function as states. Legitimate states may be threatened by violent rebellions. I model how legitimate states and rebellions may ...

2011
D. Dugal C. Pignataro

This memo provides a method for protecting a router’s control plane from undesired or malicious traffic. In this approach, all legitimate router control plane traffic is identified. Once legitimate traffic has been identified, a filter is deployed in the router’s forwarding plane. That filter prevents traffic not specifically identified as legitimate from reaching the router’s control plane, or...

2011
D. Dugal C. Pignataro

This memo provides a method for protecting a router’s control plane from undesired or malicious traffic. In this approach, all legitimate router control plane traffic is identified. Once legitimate traffic has been identified, a filter is deployed in the router’s forwarding plane. That filter prevents traffic not specifically identified as legitimate from reaching the router’s control plane, or...

Journal: :CoRR 2010
Jiangyuan Li Athina P. Petropulu

1 A Gaussian multiple-input single-output (MISO) wiretap channel model is considered, where there exists a transmitter equipped with multiple antennas, a legitimate receiver and an eavesdropper each equipped with a single antenna. We study the problem of finding the optimal input covariance that achieves ergodic secrecy capacity subject to a power constraint where only statistical information a...

Journal: :I. J. Network Security 2011
J. Udhayan Thiagarajan Hamsapriya

DDoS attack aims at occupying the victim resources so as to defy the legitimate requests from reaching it. Even though the attack traffic is generated in intimidating measures, the attack traffic mostly is disguised as the genuine traffic. Hence most of the mitigation methods cannot segregate the legitimate flows from the attack flows accurately. As the result, legitimate flows have also been f...

Journal: :CoRR 2017
Wenfei Liu Ming Li Xiaowen Tian Zihuan Wang Qian Liu

Physical layer security has been considered as an important security approach in wireless communications to protect legitimate transmission from passive eavesdroppers. This paper investigates the physical layer security of a wireless multipleinput multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) communication system in the presence of a multiple-antenna eavesdropper. We ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید