نتایج جستجو برای: attacker
تعداد نتایج: 5419 فیلتر نتایج به سال:
Intelligent Transportation Systems (ITSs) are an upcoming technology that allow vehicles and road-side infrastructure to communicate to increase traffic efficiency and safety. To enable cooperative awareness, vehicles continually broadcast messages containing their location. These messages can be received by anyone, jeopardizing location privacy. A misconception is that such attacks are only po...
Consider a stochastic process being controlled across a communication channel. The control signal that is transmitted across the control channel can be replaced by a malicious attacker. The controller is allowed to implement any arbitrary detection algorithm to detect if an attacker is present. This work characterizes some fundamental limitations of when such an attack can be detected, and quan...
TCP based Denial of Service attacks can cause major problems in Mobile Ad hoc Networks. Tracing the attacker's originand introducing a proper action to retaliate the attacker are the enduring tasks. Surviving methods suffer from major problems due to the typical behavior of Mobile Ad hoc Networks. Then a new bracing methodology is introduced to detect the type of attack and it's origi...
We consider the question of the adequacy of symbolic models versus computational models for the verification of security protocols. We neither try to include properties in the symbolic model that reflect the properties of the computational primitives nor add computational requirements that enforce the soundness of the symbolic model. We propose in this paper a different approach: everything is ...
A honeynet is a portion of routed but otherwise unused address space that is instrumented for network traffic monitoring. It is an invaluable tool for understanding unwanted Internet traffic and malicious attacks. We formalize the problem of defending honeynets from systematic mapping (a serious threat to their viability) as a simple two-person game. The objective of the Attacker is to identify...
Interactions between individuals or organizations, and the changes and evolutions that result, are a central theme of complexity research. NetAttack aims at modeling a network environment where an attacker and a defender compete to disrupt a network or keep it connected. The choices of how to attack and defend the network are governed by a Genetic Algorithms (GA) which is used to choose among a...
The evil ring is an attack on the location determination algorithms of Garcia-Alfaro et al. When inquired, an attacker returns a fake location sitting on a circle centered at the victim’s location and with radius equal to the attacker-victim separation distance. The calculation of the distance between the victim and attacker is not affected. A location-unaware node correctly determines its loca...
Cyber security is a vital concern for companies with internet-based cloud networks. These networks are constantly vulnerable to attack, whether from inside or outside organization. Due the ever-changing nature of cyber world, solutions must be updated regularly in order keep infrastructure secure. With use attack detection approaches, systems such as antivirus, firewalls, intrusion have become ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید