نتایج جستجو برای: attack scenario

تعداد نتایج: 169475  

2017
Michael Schwarz Samuel Weiser Daniel Gruss Clémentine Maurice Stefan Mangard

In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same physical machine. However, the hypervisor does not protect tenants against the cloud provider and thus the supplied operating system and hardware. ...

2011
Ahmad Heidari

Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...

2005
Tomas Eriksson Tom Ritchey

Morphological analysis (MA) is a non-quantified modelling method for structuring and analysing technical, organisational and social problem complexes. It is well suited for developing scenarios, and the method is highly appropriate for complex cases where expertise from several areas is required. It is also useful for developing and relating operational and tactical scenarios to force requireme...

2012
Nischay Bahl Ajay K. Sharma Harsh K. Verma Konstantinos Pelechrinis Marios Iliofotou Srikanth V. Krishnamurthy Robert Szewczyk Joseph Polastre Alan Mainwaring Adrian Perrig John Stankovic David Wagner JP Walters Yang Xiao Anthony D. Wood John A. Stankovic Sherif Khattab Daniel Mosse Wenyuan Xu Timothy Wood Wade Trappe Hung-Min Sun Shih-Pu Hsu

On denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802. 15. 4 based OPNET simulative model for WSN under constant and varying inten...

2014
Mohammed Alhomidi Martin Reed

Attack graphs are models that offer significant capabilities to analyse security in network systems. An attack graph allows the representation of vulnerabilities, exploits and conditions for each attack in a single unifying model. This paper proposes a methodology to explore the graph using a genetic algorithm (GA). Each attack path is considered as an independent attack scenario from the sourc...

Journal: :I. J. Network Security 2012
B. B. Gupta Ramesh Chandra Joshi Manoj Misra

A real time estimation of the number of zombies in DDoS attack scenario is helpful to suppress the effect of attack by choosing predicted number of most suspicious attack sources for either filtering or rate limiting. In this paper, ANN is employed to estimate number of zombies involved in a DDoS attack. The method does not depend on the frequency of attack and hence solves the problem of low d...

2012
Slobodan Petrović

Linear Consistency Test (LCT) is a well-known algebraic method of cryptanalysis of stream ciphers. In this paper, we use LCT in an attack on a noised irregularly clocked linear feedback shift register (LFSR). We show that it is possible to reconstruct the initial states of both the clocked and the clocking LFSR in this scheme by using an essentially algebraic attack method, such as LCT, as a bu...

2014
Heather Rosoff Jinshu Cui Richard S. John

We conducted two scenario-simulation behavioral experiments to explore individual users’ response to common cyber-based financial fraud and identity theft attacks depend on systematically manipulated variables related to characteristics of the attack and the attacker. Experiment I employed a 4 by 2 between-groups factorial design, manipulating attacker characteristics (individual with picture v...

2012
Ninghui Li Elisa Bertino Dongyan Xu Xiangyu Zhang Aditya Mathur Hong Chen

Chen, Hong Ph.D., Purdue University, December 2009. Analysis of Access Control Poli­ cies in Operating Systems . Major Professor: Ninghui Li. Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system...

Journal: :Logic Journal of the IGPL 2013
Zorana Bankovic Juan Carlos Vallejo David Fraga José Manuel Moya

It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario, the attackers collude to give negative feedback on the victim in order to low...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید