نتایج جستجو برای: misbehavior
تعداد نتایج: 965 فیلتر نتایج به سال:
A PTP method in network security for misbehavior detection system is a method of detecting malicious misbehavior activity within networks. The System detects the malicious node and blocks them by adding into Blacklist. Malicious nodes are the compromised machine present in the network, which performs the task given by bot server i.e. it does not forward the legitimate message to another node in...
Self-organizing emergent multi-agent systems are a solution to reducing the operational expenditures of complex information technology systems. However, emergent behavior is inherently unpredictable, sacrificing the guarantee of efficiency for flexibility and scalability. The addition of self-adaptation through an Efficiency Improvement Advisor (EIA) provides the ability to increase efficiency ...
This paper examines the operation of TFRC (TCPFriendly Rate Control) in scenarios where the receiver is untrustworthy. By misbehaving, a TFRC receiver can obtain a higher data rate at the expense of competing traffic. We identify and experimentally confirm several such attacks and designed Robust TCP-Friendly Rate Control (RTFRC), a TFRC variant which is resilient to receiver misbehavior. We al...
Mobile Ad-hoc NETwork (MANET) is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack ...
Networked virtual environments (VEs) such as Massively Multiplayer Online Games (MMOGs) have become very popular in recent years. However, existing client-server architectures suffer from resource constrains when the number of concurrent users increases. Research on peer-to-peer virtual environments (P2P-VEs) thus tries to create more scalable and affordable VEs via the resource sharing of mutu...
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is probably the most widespread multiple access protocol in use today, mainly due to the tremendous success of the IEEE 802.11 suite of standards. Until now most of the studies done about the protocol have focused on maximizing the performance. However as the bands become more crowded and the user terminals become easier to reconf...
The focus of this thesis lies in investigating possible abuse of the standardized medium access protocol 802.11a within Wireless Local Area Networks (WLAN). By modifying the Contention Window (CW), a network can capture more traffic in expense of its rivals. The competing network scenarios are modeled by the use of Game Theory, applying simple and repeated form games. We argue that by modifying...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید