Surviving Attacks in Challenged Networks
نویسندگان
چکیده
منابع مشابه
Surviving Information Warfare Attacks
T he past few years have seen governmental, military, and commercial organizations widely adopt Web-based commercial tech nologies because of their convenience, ease of use, and ability to take advantage of rapid advances in the commercial market. With this increas ing reliance on internetworked computer resources comes an increasing vulnerability to information warfare. Although it can range...
متن کاملsurviving DDoS attacks
ka n d u l a @ M IT. E D U C O N S I D E R T H E F O L L O W I N G S C E N A R I O : Alyssa Hacker subverts tens of thousands of machines by using a worm and then uses these zombies to mount a distributed denial of service attack on a Web server. Alyssa’s zombies do not launch a SYN flood or issue dummy packets that will only congest the Web server’s access link. Instead, the zombies fetch file...
متن کاملSurviving information warfare attacks on databases
We consider the problem of surviving information warfare attacks on databases. We adopt a fault tolerance approach to the different phases of an attack. To maintain precise information about the attack, we mark data to reflect the severity of detected damage as well as the degree to which the damaged data has been repaired. In the case of partially repaired data, integrity constraints might be ...
متن کاملOpportunistic Forwarding in Challenged Networks
LEE, CHUL-HO. Design and Analysis of Opportunistic Forwarding in Challenged Networks. (Under the direction of Dr. Do Young Eun.) Challenged networks are those networks, e.g., mobile opportunistic networks (MONs), a.k.a., delay/disruption tolerant networks, and power-constrained or duty-cycled wireless sensor networks (WSNs), where traditional Internet architectures fail to ensure end-to-end com...
متن کاملSpecial Section on Challenged Networks
s p l t a It is our great pleasure to introduce this Special Section of the Journal, presenting advanced solutions for mobile challenged networks. The special section collects extended papers from the 9th ACMWorkshop on Challenged Networks, CHANTS 2014. After a decade of research into this area, the subject of challenged networks is both generating solutions for practical applications, still re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2012
ISSN: 1545-5971
DOI: 10.1109/tdsc.2012.67