Mitigation of malicious attacks on networks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigation of Malicious Attacks on Networks

Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a new measure for robustness and use it ...

متن کامل

EA Optimization of Networks Against Malicious Attacks

The importance of considering the network structure in studying the behavior of many modern infrastructures and naturally occurring complex systems, has become increasingly clear. The topology of many real world networks makes them vulnerable with respect to targeted attacks on their components, and there has been a recent surge of interest in determining how one can optimize the structure of t...

متن کامل

Deducing Malicious Attacks in Disruption Tolerant Networks

The intermittent connectivity between nodes to transfer data is exploited using Disruption tolerant networks (DTNs).DTNs are susceptible to flood attacks which limits the network resources. A technique to detect a node has violated its rate limits. Although it is easy to detect the violation of rate limit on the internet and in telecommunication networks where the egress router and base station...

متن کامل

Tracking and Mitigation of Malicious Remote Control Networks

Attacks against end-users are one of the negative side effects of today’s networks. The goal of the attacker is to compromise the victim’s machine and obtain control over it. This machine is then used to carry out denial-of-service attacks, to send out spam mails, or for other nefarious purposes. From an attacker’s point of view, this kind of attack is even more efficient if she manages to comp...

متن کامل

Unorganized Malicious Attacks Detection

Recommender system has attracted much attention during the past decade, and many attack detection algorithms have been developed for better recommendation. Most previous approaches focus on the shilling attacks, where the attack organizer fakes a large number of user profiles by the same strategy to promote or demote an item. In this paper, we study a different attack style: unorganized malicio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the National Academy of Sciences

سال: 2011

ISSN: 0027-8424,1091-6490

DOI: 10.1073/pnas.1009440108