Hormone attack on AD

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Prevention of Buffer Overflow Attack on Mobile Ad Hoc Networks

A policy enforcing in MANETs challenging because lack of they infrastructure so introduce a Satem. Satem is a service aware trusted execution monitor. It kernel level trusted execution monitor, it verifies the node trustworthiness of enforcing the required set policies. To achieve a services aware by limiting scope of monitoring to protected services. To initialize the trust on the monitor the ...

متن کامل

Scattered Dropping Attack on TCP-Based Mobile Ad-Hoc Networks

Scattered Dropping Attack (SDA) is a simple yet very powerful denial of service (DoS) attack that is effective on both TCP and UDP based MANETs. The simulation results clearly show the impact of proposed attack on the network throughput, bandwidth wastage and received data quality. It has also been observed that even though the TCP congestion control is adaptable to the packet losses but in cas...

متن کامل

Enhanced Flush+Reload Attack on AES

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

متن کامل

investigating the effect of black hole attack on aodv and dsr routing protocols in wireless ad hoc network

wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...

متن کامل

Attack Analysis and Detection for Ad Hoc Routing Protocols

Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Network (MANET). In this paper, we present a systematic approach to analyze attacks. We introduce the concept of basic events. An attack can be decomposed into certain combinations of basic events. We then define a taxonomy of anomal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science-Business eXchange

سال: 2010

ISSN: 1945-3477

DOI: 10.1038/scibx.2010.724